Movatterモバイル変換


[0]ホーム

URL:


US11048783B2 - Authentication method and system - Google Patents

Authentication method and system
Download PDF

Info

Publication number
US11048783B2
US11048783B2US16/718,158US201916718158AUS11048783B2US 11048783 B2US11048783 B2US 11048783B2US 201916718158 AUS201916718158 AUS 201916718158AUS 11048783 B2US11048783 B2US 11048783B2
Authority
US
United States
Prior art keywords
keypad
image
scrambled
user
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US16/718,158
Other versions
US20200201960A1 (en
Inventor
Justin Pike
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Licentia Group Ltd
Mypinpad Ltd
Original Assignee
Licentia Group Ltd
Mypinpad Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Licentia Group Ltd, Mypinpad LtdfiledCriticalLicentia Group Ltd
Priority to US16/718,158priorityCriticalpatent/US11048783B2/en
Publication of US20200201960A1publicationCriticalpatent/US20200201960A1/en
Application grantedgrantedCritical
Publication of US11048783B2publicationCriticalpatent/US11048783B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
The present application is a continuation of U.S. Non-Provisional patent application Ser. No. 15/197,086, filed on Jun. 29, 2016, which is a continuation of U.S. Non-Provisional patent application Ser. No. 15/094,383, filed on Apr. 8, 2016, now U.S. Pat. No. 10,366,215, which is a continuation of U.S. Non-Provisional patent application Ser. No. 14/416,054, filed on Jan. 20, 2015, now U.S. Pat. No. 9,552,465, which is a national stage of International Patent Application No. PCT/GB2013/051913 filed on Jul. 17, 2013, and which claims priority to UK Patent Applications No. GB1306053.8 filed on Apr. 4, 2013, and No. GB1212878.1 filed on Jul. 20, 2012, all of which are herein incorporated by reference in their entireties.
BACKGROUND1. Field
This invention relates generally to the field of user authentication, and more particularly to the field of PIN-based verification. The invention is suited for use in situations where a user is required to enter a code, such as a Personal Identification Number (PIN), which is validated prior to completing an operation. The operation might be any type of operation.
2. State of the Art
Authentication is a technique used in a variety of situations where an individual's identity and/or authorisation needs to be verified prior to being allowed to perform an act or gain access to some controlled or managed resource such as a device, building, a computer system, a financial account, a service etc.
One common approach to authentication is to record some pre-selected identifier (such as a code or combination of symbols) which is then maintained in secrecy in a secure location and available only to authorised parties. The identifier is stored in association with a particular user or group of users, and may sometimes be stored and/or used in conjunction with another pre-determined identifier such as a username, for example. The identifier is often selected by the user himself although sometimes it may be the resource manager or owner who determines it. The user may, in many cases, be able to change their previously selected identifier. Often, the identifier is chosen when the user initially joins an organisation; for example, when he begins employment at a certain company, or registers with a provider for a certain service. After the identifier has been selected and assigned to an authorised individual, that user is required to supply the pre-determined identifier each time he requests permission to perform the controlled act or gain access to the resource or service. The user's inputted identifier is compared with the stored version. If the user is able to supply the correct identifier then his identity is deemed to have been verified and access is granted. If, on the other hand, the correct identifier is not supplied then access is denied.
In this document such an identifier may be referred to as a Personal Identification Code (PIC). One common example of a PIC is a 4 digit numeric code typically referred to as a Personal Identification Number (PIN). The term ‘PIC’ is intended to include the term ‘PIN’ (Personal Identification Number). However, other codes of different lengths and containing different types of characters or symbols may be used. The present invention is not intended to be limited with regard to the length of the identifier used, or the type of characters it contains. For example, it may contain numeric digits, alphabetical characters, pictures, punctuation or any other kind of symbol, or a mixture thereof. The term ‘PIN’ or ‘PIC’ may be used hereinafter to refer to the user's identifier for the sake of convenience but should not be construed as being limiting in any way as to the length, type or format of the identifier.
PIN-based verification systems typically comprise a keypad which enables the user to enter their pre-selected PIN. A typical keypad layout known in the art is shown inFIG. 14a. A keypad is a set of buttons or ‘keys’ arranged in a block or ‘pad’. The keys are set out in a grid adjacent one another to form the pad. The keys have indicia (identifiers) printed, engraved, embossed or otherwise displayed on them. The indicia on a key typically consists of one symbol e.g. ‘6’ but could comprise more than one symbol e.g. ‘AB’.
The indicia on the keys are usually arranged in an ordered manner, such as a sequential series. For example, numeric digits would typically be ordered in ascending order. In this document, the term ‘keypad’ may be used interchangeably with the term ‘pinpad’.
Keypads are often found on alphanumeric keyboards connected to computing devices. Other devices such as calculators, push-button telephones, combination locks, and digital door locks are also known to comprise a keypad. The advent of portable telecommunications and computing devices has also seen keypads introduced into mobile devices such as mobile (cellular) telephones, tablet computers, PDAs and so on.
Many electronic devices now include computer processing capabilities and a touch screen interface capable of displaying a keypad. These may be used for a variety of purposes, including allowing an authorised user to ‘unlock’ the device by entering a passcode comprising a combination of pre-selected symbols, or entering a telephone number so as to make a call. Card-reading terminals used in financial transactions also have keypads to allow the user to enter his PIN via the keypad.
Each type of smart phone (e.g. brand and/or model) may have a particular style of keypad associated with it as its ‘default’ keypad. For example, the keys may be arranged in a particular format or layout, or a particular font may be used for the indicia. Therefore, the user of an electronic device may become familiar with a certain ‘look and feel’ with respect to the keypad on that device. An example of a typical keypad generated and displayed on a widely known smart phone is shown inFIG. 14b. The default keypad is generated by the execution of a procedure call within the phone.
In contrast to conventional keypads which have depressible (physically movable) keys, a touch screen can be used to display an image of a keypad having numbered or otherwise indicated ‘hot spots’ corresponding to the physical keys of the conventional counterpart. The user touches the hotspots corresponding to the keys of his choice instead of pressing a moveable key. Sensors placed below the surface of the screen sense which area(s) have been selected by the user, thus ‘reading’ the user's input.
Perhaps the most common use of keypads and PIN-based technology is in relation to financial transactions e.g. automated teller machines (known as ‘ATMs’ or ‘cashpoint machines’) and point of sale devices for banking cards (i.e. debit cards and credit cards).
Prior to the introduction of PIN-based authentication, if a customer wished to make a purchase for goods or services, he would be required to provide a signature which would be compared to the signature on the back of the card. However, signatures can be forged with relative ease.
In order to address this problem, smartcard technology has been introduced in many countries for credit, debit and ATM cards. This payment system (sometimes known as the ‘chip and pin’ system) is based on a global standard known as the EMV standard. Using this approach, credit and debit cards are provided with an embedded microchip. When a customer wishes to pay for goods using this system, the card is placed into a “Point of Sale” terminal or a modified swipe-card reader, which accesses the chip on the card. Once the card has been verified as authentic, the customer enters a 4-digit PIN, which is submitted to the chip on the smartcard; if the two match, the chip tells the terminal the PIN was correct, otherwise it informs it the PIN was incorrect. The inputted PIN matches the stored PIN if each symbol in the input is also found in the stored version, and in the same order and number.
In certain situations financial transactions may be carried out by swiping the magnetic stripe on the card so as to read the card's data, or by manual entry of the card details, rather than by inserting the card into a dedicated card-reading device.
It should be noted that as the PIN is sent back to the host for verification, security considerations become relevant because the PIN can be intercepted during the transmission process.
Since the introduction of PIN-based verification, fraud arising from face-to-face transactions (where the card and the customer are physically present at the retail site where the transaction takes place) has been drastically reduced because it is significantly more difficult to fraudulently obtain or guess a PIN than it is to forge a signature.
Moreover, prior to the advent of PIN-based authentication, if a customer's signature was forged, the card provider was usually held legally liable for any ensuing fraud and was compelled to reimburse the customer. With the introduction of smartcard technology, however, the onus has typically shifted to the customer to prove that they had acted “with reasonable care” to protect their PIN, rather than on the card provider being required having to prove that the signature provided during the transaction matched that on the card. This transfer of liability provides very significant financial benefits for card providers.
Another drawback of signature-based verification is that it does not lend itself to transactions where the card (and the customer) is not present at the retail premises when the transaction is performed—for example, transactions made over the telephone or internet. Such transactions are usually known as ‘card not present’ (CNP) transactions. CNP transactions are now commonplace in today's retail environment, with many customers choosing to conduct financial operations without being at the retail location. However, while PIN-based technology provides a relatively secure authentication solution for ‘card present’ face-to-face transactions, fraud arising from CNP transactions is rising.
In addition, mobile (cellular) telephone technology has opened new opportunities for retailers and consumers alike. So-called ‘smart’ phones comprising sophisticated computing capabilities and have become extremely popular, offering the user facilities such as the ability to surf the web and view retailers' web sites. Customers and retailers alike are often not tied to one physical geographical location but are ‘on the move’. For example, customers may wish to make a purchase via a web site being viewed on a mobile phone while waiting at a bus stop; or a parking attendant may wish to take payment from a driver in a car park. In such cases, dedicated Point-of-Sales terminals are not available for use.
However, despite the enormous popularity of mobile computing technology, in particular telephones, its use in respect of CNP transactions has been limited due to security concerns as data (such as the user's PIN) can be intercepted during transmission from the device to/from the card provider's server, or whilst residing in the phone's internal memory.
Some PIN related technology has been designed with mobility in mind and is known in the prior art.
For example, CardEase Mobile® is a mobile payment app which, in conjunction with a mobile card reader, enables a retailer to take Chip and PIN mobile card payments from a customer. The retailer enters the amount of the purchase into an app downloaded and installed on his mobile phone (or tablet device). The retailer then gives the card reader device to the customer who swipes or inserts his credit/debit card into the reader, and enters his PIN via the keypad on the reader device. The reader then connects via Bluetooth to the app on the retailer's mobile device, which then connects to the service provider via the phone's internet connection for payment authorisation. Once the payment has been approved, the customer removes his card from the reader and the retailer emails or texts a receipt to the customer.
However, this known arrangement requires the use of the card reader. In effect, it uses the mobile phone to play the role of the point-of-sale terminal which would usually be located within the store/shop. The merchant taking the payment still needs to be at the same location as the customer making the payment because he must hand the card reader to the customer for use with his credit or debit card. The system does not eliminate the need for a dedicated (i.e. purpose built) card-reading device.
Another example of the prior art is disclosed in WO/2012/004395 A1 (‘iZettle’). The iZettle arrangement comprises a portable card reader device for reading a smart card, a portable reader device and a payment server. The aim of the disclosed method is to eliminate the unsecure keyboard in a mobile phone used for entering a PIN, and instead use a separate PIN entry device which fulfills the EMV level specification. In essence, the disclosed approach uses an external PIN pad provided with all the required secure chips and components and which simply communicates with the mobile phone via a Bluetooth connection. Thus, as above, the iZettle disclosure does not solve the problem of using unsecure mobile devices for PIN entry, it simply circumvents it by using a separate PIN entry device.
Indeed, the iZettle document states (lines 6 to 19) that:
    • ‘A more practical solution would be if a credit card payment could be conducted using a well-known, non-bulky and commonly used device such as a mobile phone. However, an ordinary mobile phone does not have a built-in card reader where you could swipe your credit card, and even if that particular problem could be overcome, there is still and issue regarding the level of security a mobile phone provides. It is well known that for instance a spy program could infiltrate the mobile phone and hijack credit card information and identification information, such as the PIN code entered into the mobile phone via the phone's keyboard when conducting a credit card payment, without the user even knowing it. In light of the above, a standard mobile phone is generally not considered to be a secure device, and thus not suitable for making credit card payments with. Thus, finding a way to make secure credit card payments with a mobile phone is highly sought after’.
Another known arrangement (also from the applicant of WO/2012/004395 A1) comprises a device (‘dongle’) and associated software which fits into the charging port of a smart phone.
When a transaction is to be made, the customer's card is inserted into the dongle. The customer is then asked to sign the phone's touch screen with their finger in order to authorise the transaction. Using this approach, the user does not need to enter a PIN. Therefore, the problem of PIN entry on an insecure portable device is avoided rather than solved.
Yet another known approach is disclosed in WO 2011/093998 A1. Again, the disclosed approach uses a dongle-based card reader which is plugged into the device. It does not provide a secure technique for enabling PIN-based authorisation.
GB 2416058 A discloses an approach for verifying a request for access to a server. In response to an access request, a random string of characters is generated by a ‘combination generator’ in a security server. It then uses this random string to generate ‘image data’ which is sent from the server to the user's computer. The keypad on the user's computer is then modified in accordance with the image data. The user then enters his PIN using the modified keypad displayed on the computer. Positional data relating to the user's selection within the grid of keys (e.g. first-row-first-column) is stored as a record of the user's PIN. The positional data is then converted by the user's machine into character data such as a string of digits to form an encoded PIN which is then sent to the server for verification. However, the encoded PIN can be ‘decoded by knowing the image data’—lines 22, 23 ofpage 10. Therefore, as the image data is stored on the user's computer, if the security of the user's machine is compromised (e.g. hacked into, or is infected with malware) access may be gained to the image data, therefore enabling a third party to decode the user's PIN.
Thus, it is desirable to provide an authentication method which does not render the PIN vulnerable to unauthorised access during transmission between devices, or when stored temporarily in an electronic device during the verification process.
SUMMARY
Ideally, a PIN-based authentication solution which would enable a user to complete a CNP transaction using a PIN to authenticate in a secure manner. Ideally, such a solution:
    • could be implemented on a portable electronic device such as a mobile phone, tablet computing device, laptop, PDA etc, or on a desktop computer or fixed device;
    • would enable PIN-based authentication to be performed on any suitably arranged device having some computing capabilities;
    • would require the user to enter his PIN using the same digits as his stored PIN and in the same order (rather than requiring the user to enter an ‘encoded’ or somehow disguised/translated version of his PIN);
    • would be easy and intuitive to use;
    • would not require the user's machine to have access to the user's ‘real’ PIN, or any knowledge of how to calculate it
    • would not need to execute any conversion or encoding algorithm (which carries with it a time and processing overhead, and can be used to discern the user's PIN).
Such an improved solution has now been devised which provides at least these advantages.
Thus, in accordance with the present invention there is provided a method and system as claimed in its various embodiments herein.
According to a first aspect of the invention, there may be provided a computer-implemented verification method comprising the step of: enabling a user to input an identifier into an electronic device having:
    • i) a screen; and
    • ii) a keypad operable within a keypad zone of the screen;
      by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone.
The image may be referred to as a ‘scrambled keypad image’ for ease of reference.
The keypad is operable in that has the functionality expected of a keypad by a person skilled in the art. The skilled person would understand the term ‘keypad’ to mean an electronic or mechanical grid of keys, each having at least one indicia associated with it, which, when selected by a user, causes the associated indicia to be inputted into a device or system for storage and/or processing. In the context of the present invention, the keypad is an electronic version of a keypad. It may be thought of as a ‘virtual’ keypad in that it is a software emulation of a mechanical keypad. It provides all the functionality of a mechanical keypad, comprising labelled keys which the user can select to provide input to a computer-based system.
The keypad may be generated on or by the electronic device. It may be generated by a procedure call. The procedure may be provided within a library supplied by the manufacturer of the device.
By contrast, the scrambled keypad image is a representation of a keypad. The representation may comprise a representation of a whole keypad or at least part of a keypad. It may depict (represent, illustrate) one or more ‘keys’. The image may be electronically formed. It may be a graphical image, an optical image, a video or some other form of visual representation. It may be formed or stored in digital format in an electronic file.
This provides the advantage that the layout of the ‘keys’ in the representation may not be easily read by an unauthorised party who might intercept the representation during transmission or while it is displayed on the electronic device.
The scrambled keypad image is not a keypad per se because it is devoid of any functionality. It is merely a representation of a grid of keys. Touching, clicking on or otherwise selecting any ‘key’ depicted in the image does not, in and of itself, produce any effect or generate an input.
However, it should be noted that the scrambled keypad image may sometimes be referred to as a ‘keypad’ ‘scrambled keypad’ or an ‘overlying keypad’ purely for ease of reference because in use it appears to function as a keypad. Areas of the image may be referred to as ‘keys’, again only for ease of reference because this is what the user appears to see and use. However, it should be remembered that this is not actually the case, and that the image is not a keypad in reality.
The invention may enable the user to enter his identifier via the same device component that is used to display the scrambled keypad image (the screen). Phrased another way, the screen may serve as both the output (display) device for the scrambled keypad image and the input device via which the user's identifier may be entered. This contrasts with any prior art disclosure wherein the keypad is displayed on one device component (e.g. screen) and the user's input is received via another device component (e.g. keyboard).
An advantage of this feature is that it may enable the user's input from the image to be mapped to the electronic keypad which may be at least partially hidden from the user's view such that the user's input is automatically encoded upon entry by the user. The input is automatically encoded in the sense that the electronic device may not need to convert, encode or in any way process the user's input. The keypad may be generated by a procedure call executed on the electronic device. The operable, electronic keypad may be referred to as a ‘reference’ or ‘underlying’ keypad for ease of reference.
Preferably, the user's operation of the keypad key via the image generates an encoded version of the user's intended input. Preferably, the image is displayed within the keypad zone such that as the user touches, clicks on or otherwise identifies a location within the image, an operable keypad key at that location is activated to provide an encoded version of the user's input.
Thus, the user's identifier is input via the image. The user may select a portion of the image in order to enter the identifier. The image portion may resemble or depict a keypad key. Thus, the user may operate the keypad through the image.
Preferably, the image functions as a mask or cover superimposed over the keypad such that when the user touches, clicks on or otherwise identifies a location within the image it operates or activates the keypad key positioned at that location within the keypad zone.
Preferably, the keypad zone and/or the image remains in a fixed position on the screen during input of the user's identifier. This differentiates the invention from those known systems wherein the keys or entire keypad move on the screen during the verification process. As the image of the present invention remains in a fixed location, this provides a solution which is easier to use and requires less processing by the electronic device.
Thus, in one sense the invention may be viewed as enabling a scrambled keypad image to be ‘superimposed’ over an ‘underlying’ keypad such that when the user enters his input via the overlaid scrambled keypad image it is encoded in accordance with the layout of the underlying (preferably unseen) keypad.
The ‘underlying’ keypad may be viewed as an object generated and residing in the device's volatile memory at run-time to provide a model of a conventional mechanical keypad.
Thus, the invention provides the advantage that the user's ‘real’ identifier is never stored within the device and is not transmitted for verification. Therefore, the user's identifier cannot be derived by any potential interceptor without knowledge of the mapping between the overlaid image and underlying, functional keypad.
Preferably, the mapping between the overlaid image and underlying keypad is not stored in the electronic device, or derivable by the electronic device. The mapping (or correlation) between the positions of the two sets of ‘keys’ may be stored on a server remote from the electronic device.
Preferably, the scrambled keypad image may be sent from a remotely located computer-based resource to the electronic device. The resource may be a server. Thus, the scrambled keypad image may not be generated on the electronic device. A version of the scrambled keypad image may be stored on the server. The version may be a record of the order of the symbols (“keys”) in the scrambled keypad image.
The keypad zone may be a defined area or portion of the screen. Thus, the keypad zone may occupy the entire screen area or a portion of the screen. The scrambled keypad image may be displayed such that it covers the keypad zone completely, exactly or partially. Preferably, the underlying keypad is at least partially hidden from view so that the user is not able to see at least some of the keys of the keypad.
The identifier may be a Personal Identification Code. It may be a PIN (Personal Identification Number). It may comprise any number, type or combination of symbols or indicia (as explained above). The identifier may have been pre-selected by the user prior to executing the presently claimed method. The identifier may be stored remotely from the electronic device e.g. on a server. The scrambled keypad image and/or keypad may comprise numeric digits, alphabetical characters, punctuation, symbols or any other indicia, or a combination thereof. One or more symbols may be associated with each key.
Preferably, the user may be able to select a plurality of “keys” in the scrambled keypad image to input an identifier comprising more than one symbol.
The scrambled keypad image may be scrambled with respect to a reference keypad. The keypad image may depict a block or grid comprising a plurality of adjacent keys. It may be ‘scrambled’ in the sense that the symbols on the “keys” are not in sequential order and/or not in the order which one would expect, perhaps with reference to the reference keypad. The scrambling may be in accordance with a random generation process, or a process that approximates to a random process. The reference keypad may be the keypad operable within the keypad zone, or a default keypad associated as standard with a make, model, type of electronic device.
Thus, the same indicia may be present in both the underlying keypad and the scrambled keypad image but they are provided in different positions. Put yet another way, the order of the keys in the reference keypad is different from that of the scrambled image. The scrambled keypad image may provide the same ‘look and feel’ as the default keypad associated with the electronic device, but with the “keys” in different relative positions.
The respective positions of one, some or all “key(s)” in the scrambled keypad image may be different from the position of the same key(s) in the underlying keypad.
The user may operate the keys of the underlying keypad via the scrambled keypad image by interacting with the “keys” displayed on the screen. For example, the user's input may be entered by the user touching the screen (with a finger or other device) or by selecting the desired “key(s)” using a pointing device such as a mouse or tracker ball. Other selection methods may be used to similar effect, thus falling within the scope of the invention.
The position and/or dimensions of the keypad zone may be specified by a procedure or method call.
Preferably, the keypad zone comprises a plurality of sub-zones or ‘hot spots’. The position of at least one ‘key’ in the scrambled keypad image and/or keypad may correspond to the position of a sub-zone such that there may be a mapping between the “keys” of the scrambled keypad and the keys of the keypad and/or the plurality of sub-zones. It is desirable that the mapping is not derivable from or by the electronic device. The hotspots may underlie the keys of the scrambled keypad image.
The (underlying) keypad may be scrambled after each of the user's key selections. Thus, a different scrambled underlying keypad may be used for each keystroke of the user's input.
Preferably, the scrambled keypad image is received by the electronic device from a computer-based resource (e.g. a server) located remotely from the electronic device. It may be sent to the electronic device from the server in respect to a request for an image, the request being sent from the device to the server. The scrambled keypad image may be generated by the server.
Preferably, the scrambled keypad image is pre-generated. In one embodiment this may mean that it is generated prior to, not in response to, the request from the electronic device. The image may be generated prior to execution of the verification method.
The encoded version of the user's input (identifier) may be sent from the electronic device to a remote computer-based resource. This resource may be a server. Preferably, the server receives the encoded version of the user's input and processes it. The processing may provide a decoded version of the user's inputted identifier.
Thus, the user's ‘real’ identifier may not be transmitted. Only the encoded version may be transmitted, which may be meaningless to an unauthorised party who does not know the mapping between the the “keys” in the scrambled keypad image and the keys in the underlying keypad.
The decoding may be performed using a stored version or form of the scrambled keypad image. The stored version or form of the configuration of the keys may be a filename. The decoding step may provide a decoded version of the user's input. Thus, the user's ‘real’ identifier may be generated by translating each symbol in the encoded version into its corresponding counterpart in the scrambled keypad image.
The user's decoded input may be compared with a stored version of the identifier. The user's input may be deemed to be correct if the input matches the stored identifier.
Preferably, the method further comprises the steps:
    • generating a plurality of scrambled keypad images;
    • selecting one scrambled keypad image from the plurality; and
    • sending a copy of the selected scrambled keypad image to the electronic device.
The method may further comprise the step of:
  • removing at least one scrambled keypad image from the plurality prior to performing the selection.
The method may further comprise the step of:
  • removing the selected scrambled keypad image from the plurality after sending the copy to the electronic device.
The method may further comprise the step of:
  • removing from the plurality any scrambled keypad image which has at least one key in the same position as the same key in a reference keypad.
Preferably, the positions of the keys in the scrambled keypad image remain unchanged relative to one another during input of the user's identifier. This is in contrast to prior art arrangements in which the position and/or order of the keys displayed to the user may scramble or rearrange or move on the screen after each of the user's key selections and/or after each verification session.
Preferably, the symbol of at least one key in the scrambled keypad image is at least partially obscured or obfuscated but remains readable to the user. This may have benefits in making the representation difficult to read using OCR software. This enhances the security of the system and method.
The electronic device may be a mobile telephone, a PC, a tablet computer, a laptop, a PDA, a card-reading terminal or other electronic device having a screen. The electronic device may be able to support a communications protocol such as TCP/IP, either over a wireless or fixed line, although other protocols may be supported, such as Bluetooth, RS232 etc.
The communication between the device (e.g. mobile phone) and the computer-based resource (e.g. server) may be via a fixed telecommunications line or via a mobile telecommunications/wifi etc. connection—essentially any IP-based device may be used.
The scrambled keypad image may be displayed via a web browser, or an application embedded within a browser, or a standalone software application, and/or an application providing a graphical user interface to allow the user to interact with the scrambled keypad image.
It is preferred that the mapping correlation between the indicia positioning of the scrambled keypad image and the underlying keypad is stored remotely from the device, typically at the computer based resource remote from the device.
In order to enhance security, the scrambled keypad image may be renamed and/or encrypted prior to being sent to the electronic device. This provides the benefit that 3rd parties (such as malware) are prevented or at least impeded from intercepting and decoding the identifier.
The method may further comprise the step of delivering an indicator to the user to confirm that the scrambled keypad image has been provided by a legitimate source. The indicator may be a ‘watermark’. The indicator may be a textual message, image, video, sound, vibration or other tactile indication. The indicator may have been chosen by the user.
Preferably, the scrambled keypad image is erased from the electronic device following the user's input, or following a specified period of time.
A new (i.e. different) scrambled keypad image may be sent to the device if the user makes a mistake when inputting the identifier.
Also in accordance with the invention there may be provided a computer-implemented method for verifying a pre-stored Personal Identification Code (PIC), the method comprising the steps:
    • generating a representation of a keypad wherein the position of at least one indicia in the representation is different from the position of the respective indicia in the keypad;
    • sending the representation to a remote device for presentation to a user to enable the user to input a PIC using the representation;
    • receiving an encoded version of the inputted PIC from the remote device;
    • decoding the encoded version to provide a decoded version of the inputted PIC
    • comparing the decoded version of the inputted PIC with the pre-stored PIC
According to a second aspect, there is provided a computer-implemented method for verifying a pre-stored Personal Identification Code (PIC), the method comprising the steps:
    • receiving a representation of a keypad from a remotely located computer-based resource, wherein the position of at least one indicia in the representation is different from the position of the respective indicia in the keypad;
    • presenting the representation to a user to enable the user to input a PIC using the representation;
    • generating an encoded version of the inputted PIC;
    • sending the encoded version of the inputted PIC to the computer-based resource for decoding such that the decoded version of the inputted PIC can be compared with the pre-stored PIC.
According to a further aspect, there is provided a computer-implemented method for verifying a pre-stored Personal Identification Code (PIC), the method comprising the steps:
    • using a computer-based resource to generate a representation of a keypad wherein the position of at least one indicia in the representation is different from the position of the respective indicia in the keypad;
    • sending the representation to a remote device;
    • presenting the representation to a user via the remote device to enable the user to input a PIC using the representation;
    • sending an encoded version of the inputted PIC from the remote device to the computer-based resource;
    • using the computer-based resource to decode the encoded version to provide a decoded version of the inputted PIC and compare it with the pre-stored PIC
According to another aspect of the invention there is provided a computer-implemented verification method comprising the step of:
  • enabling a user to input an identifier by selecting at least one key via a scrambled keypad presented to the user within a keypad zone of a screen associated with an electronic device.
According to another aspect of the invention there is provided a computer-implemented system arranged and configured to perform any embodiment of the method described above.
The benefits of the invention include:
    • a reduction in the likelihood of fraud arising from CNP transactions;
    • a significant reduction in the cost associated with such fraud;
    • a shift in liability from the card issuer to the user in respect of fraudulent card usage;
    • the convenience for the user of secure CNP transactions.
These and other aspects of the present invention will be apparent from and elucidated with reference to, the illustrative embodiment described herein.
An embodiment of the present invention will now be described, by way of example, and with reference to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGS. 1 to 4 illustrate some examples of the various types of keypads that can be generated in accordance with the invention.
FIG. 5 illustrates the production of a scrambled keypad representation according to an exemplary embodiment of the invention.
FIG. 6 illustrates the Registration process in accordance with the invention.
FIG. 7 illustrates an exemplary custom keypad database created for the registered device.
FIG. 8 shows an illustrative transaction process in accordance with the invention;
FIGS. 9 and 10, illustrate an overview of an example secure transaction application process in accordance with an embodiment of the invention.
FIG. 11 shows an illustrative ‘standard’ keypad in accordance with an embodiment the invention.
FIGS. 12a, 12band 12cshow examples of scrambled keypad images which are suitable for being superimposed over the standard keypad ofFIG. 11.
FIG. 13 shows a scrambled keypad images being superimposed on top of the standard (reference) keypad of a device.
FIG. 14ashows a standard numeric key pad as known in the prior art.
FIG. 14bshows a numeric keypad on a mobile phone as known in the prior art.
FIG. 15ashows a pre-generated keypad image prior to the application of a watermark.
FIG. 15bshows the keypad image ofFIG. 15awith the watermark provided in the bottom left corner of the keypad zone.
FIG. 15cshows the keypad image ofFIG. 15bbut with the watermark in a different position (bottom left).
FIG. 15dshows the keypad image of15awith a photographic image used as a watermark in the background.
FIG. 16atoFIG. 16eshow different scrambled keypad images generated from 4 different numeric sequences.
FIG. 17 shows a scrambled keypad image having a combination of alphabetical and numeric keys.
FIG. 18 shows three partial images which, when shown repeatedly in rapid succession, form an apparently static, recognisable image.
FIG. 19 shows an example of how the invention may be implemented within a financial transaction processing system.
FIGS. 20A-20E show an example of the generation of an encrypted PIN based on a user's PIN.
DETAILED DESCRIPTION
Turning to the Figures, an exemplary embodiment is now described in relation to use with a mobile phone. However, the invention may be used to perform PIN verification on a variety of different types of device, assuming that the device has some processing capabilities and a screen for the display of a keypad.
The exemplary embodiment also relates to use in respect of financial transactions. One application for which the invention is suited is that of on-line banking. However, the skilled addressee will readily understand that the invention may be employed in other settings and for non-financial purposes. It is not limited to business or commercial applications.
Importantly, the invention can be used in any situation where verification of an individual's identity is required before allowing that individual to have access to some controlled resource. That controlled resource may be any type of resource. It may be funds sitting in a financial account. Equally, it could be a building, a computer system, a patient's medical records, a service and so on. For example, it may be used for the verification of a passcode on a door lock to establish authentication prior to allowing entry to a building.
It is important to note that the financially-oriented application described below is only one purpose to which this invention may be put. It has been selected for exemplary purposes because chip and PIN verification is perhaps the most widely known use of code-based verification and therefore most readily recognised by readers of this document. However, the skilled addressee will understand that the invention is not limited in respect of the environment or context in which the invention may ultimately be put to use.
It is also important to note that the invention does not constitute a means for performing a transaction per se. It is a verification tool useful for authenticating the identity of an individual who has requested access to a controlled resource. It does not dictate how that access is performed after authorisation is established, neither does it dictate how any other operation or possible transaction is conducted following successful verification.
The exemplary embodiment described below essentially operates by creating an image of a scrambled version of a keypad (which may alternatively be called a ‘PIN pad’). The scrambled keypad image is sent for presentation or display on the targetelectronic device1 for the user to view. In this example, the target device is amobile phone1, as shown inFIG. 6.
The scrambled keypad image is arranged to resemble the standard, default keypad for the device. Each brand and/or model of device typically has its own style of default keypad which might be different in layout, symbols, size, colour etc. from the default keypads associated with other devices. The default keypad is usually generated and displayed on the mobile phone by a procedure call, which specifies the format of the keypad for that device and where it is to be displayed on the screen. The default keypad is a grid which occupies a specific area on the screen i.e. it is displayed at a specified location. It is a pre-defined area or portion (referred to herein as a ‘keypad zone’) within the phone's screen. The keypad zone is divided up into sub-zones wherein each sub-zone represents a key in the default key pad. Another way of saying this is to say that each sub-zone is associated with a particular symbol. The symbol for each key is displayed for the user to see on the screen within the location of its respective sub-zone. Therefore, if the user selects (e.g. touches or clicks on) an area designated to a particular sub-zone, the symbol for that associated key is recorded. In this way, the keypad serves as a virtual version of a mechanical keypad, generated electronically by software, detecting the location of the user's input within a defined screen area and using that to generate the input data rather than using physically pressable keys.
In such virtual keypads, each subzone is essentially a ‘hotspot’ on the screen, and a plurality of hotspots are combined adjacent one another to form a keypad. In the present example, thedefault keypad2 of the phone is arranged as a 3×4 grid of keys, each key4 having a symbol associated with it. In this case, the symbols include numeric digits. Eachkey4 is a ‘hotspot’ area of the screen, each hotspot being associated with a symbol in the virtual keypad.
An example of a well-known style ofdefault keypad2 used with smart phones is shown inFIG. 11. Thedefault keypad2 is generated on thetarget device1 itself—it is not sent to thedevice1 from the remotely located server.
Thisstandard keypad2 is then ‘overlaid’ with the scrambledkeypad image3 which is sent to the phone and is displayed on the screen at the keypad zone. This superimposition is achieved by displaying the image of the scrambled keypad within the keypad display zone such that the positions of the scrambled ‘keys’ correspond to the positions of the hotspots in the default keypad. The alignment of the two keypads is such that only the scrambled keypad image is seen by the user and the underlying, operable keypad is hidden, at least partially but preferably entirely, by the image. Therefore, as far as the user is concerned, there is only one keypad, which looks exactly like the keypad the user expects, except with the keys in different positions relative to one another.
As the default keypad for the mobile phone is the ‘norm’ against which the scrambled keypad is referenced, it may be referred to as a ‘reference keypad’.
FIGS. 12a, 12band 12cshow examples ofkeypad images3 which are suitable for overlay on top of thestandard keypad2 ofFIG. 11.
The scrambled keypad is sent to the phone as an image. Alternatively, it could be sent as a video file, to be discussed in more detail further below. This picture, video orimage3 may be referred to as a ‘representation’ because in one sense it represents a physical (depressible) keypad.
The scrambledkeypad image3 has been pre-generated (i.e. prior to the initialisation of the verification process). It is randomly selected from a set of pre-generated scrambled keypad representations and then sent over a telecommunications network to the handset (i.e. mobile phone)1. The scrambled keypad image ofFIG. 3 is a representation of thedefault keypad layout2. The difference between thedefault keypad2 and the scrambledkeypad image3 is that therespective keys4 are ordered differently. In other words, the same digits are present in each keypad but at least two are in different positions within the keypad grid.
Thiskeypad representation3 has been generated to have exactly the same dimensions as the default keypad so that it can perfectly superimpose it. Thus, the mobile phone user (customer) views only one seamless keypad. The user is unaware that there is anunderlying keypad2 which has been generated in the background, behind the one that he sees and uses for entering his input. The image is sent to the user's device together with one or more instructions to invoke or call the necessary procedure for generating the underlying keypad.
The randomly-selected, scrambledkeypad image3 is effectively overlaid onto the phone'sdefault keypad2 so that when the user enters his PIN, a different result is generated within the device other than that which the user intended to enter, or at least thought he was entering. This is achieved as a result of the relationship (mapping) between the differently positionedkeys4 in the twokeypads2,3. The user touches the screen at a particular location to enter a digit shown in the overlying scrambledkeypad image3, but this is interpreted as being the digit in theunderlying keypad2 at that sub-zone. As the user enters a subsequent input its corresponding, underlying symbol is concatenated to the previous input to construct a complete PIN.
In this way, an encoded version of the user's PIN is produced based upon the position of thehidden keys4 which the user selects via the scrambledkeypad representation3. If the user makes a mistake, a new (different)keypad representation3 is sent to thedevice1.
Thus, the PIN that the user thinks he is entering is not the PIN recorded by the software residing on the user's phone. The user's ‘real’ PIN is never stored on theinsecure phone1, and is not transmitted over any (insecure) network. Only the encoded version is stored, transmitted. The encoded version of the PIN may be encrypted prior to transmission to further enhance security. Thus, any interceptor would be unable to decode, guess or re-translate the real PIN without knowing how the positions of the keys in each keypad map to one another.
In the present embodiment, the decoding process is handled by a component of the invention which ‘knows’ the layout of the keys in both keypads and is, therefore, able to map the encoded digits back to their original counterparts, thus arriving back at the user's intended input. This deciphered PIN can then be compared against the user's previously stored PIN for verification purposes.
In the exemplary embodiment, the scrambledkeypad image3 is encrypted before it is sent to thephone1. Upon arrival at thephone1 it is loaded into a secure or protected portion of memory on the device1 (or at least as protected as it can be). In other words, all of the usual security features are used by the invention as if the customer's real PIN has been entered (rather than a translated version). This provides another layer of security and protection.
These aspects of the invention are now discussed in greater detail in relation to one way in which the invention can be put into use.
Pin Pad Production
The ‘PIN Pad Production Program’6 is responsible for generating all of the scrambledkeypad images3 used throughout the system. An overview of this aspect of the invention is shown inFIG. 5.
If simply randomly scrambled keypads are used, there is a risk that one or more keys may not be positionally scrambled. This could resort in one or more keys of the users input PIN corresponding positionally on the standard and scrambled PIN. This is not ideal.
Consequently, during PIN pad (image) generation, scrambled key pad images that would have one or more keys positionally corresponding to the standard keypad are discarded. The PIN pad production is therefore preferably not purely random, but is subjected to a selection process to select/discard according to a specific criteria.
The PIN pad (image) generation takes place in a secure environment, typically complaint with payment card industry data security standard.
The output resolution and file type must be initially set up before use on a particular target device1 (in this case the type of mobile phone). This ensures that outputted images are generated to the optimum resolution for that device e.g. 256×184.
A master ‘Background Image’7 is then selected which matches the resolution as set above, and a ‘Permutations File’5 selected containing all the required permutations of digits (keys) for the final keypad images. In one implementation, thisfile5 must be a comma separated text file with each permutation on a new line. However, a variety of implementations may be devised to the same effect. For example, each permutation could be separated by a # or *.
The ‘Permutations File’5 is then merged with the ‘Background Image’7 using the user's selection of Font Type, Size and Colour to produce the completedkeypad image3. The completedkeypad image3 is then optimized and reduced in size to be as small as possible for optimum transmission speed.
In addition to standard monochrome keypads as shown inFIGS. 1, 5, 911,12 and13, thebackground image7 may be manipulated. For example, the colour of the background and/or the default font type, size and colour can be altered so that an unlimited database of keypads may be generated for every type of screen and device.
In some embodiments, advertisements, educational messages or other content may be incorporated in the presented imagery.
These keypad images may employ special fonts or colours to enable any specific regional characters e.g. Arabic to be used, and also to ensure that the images cannot be read by unauthorised Optical Character Recognition programs (thus enhancing security).
Each keypad image that is produced is also given a unique filename and a master index is created for all keypad images that have been generated. When a scrambled keypad image is sent to the device, a copy of the filename of that image is temporarily stored. This filename contains the order of the keys within the keypad image. This enables the mapping between the scrambled keypad image and the reference keypad to be recorded.
For security purposes, the scrambledkeypad image3 is renamed before it is encrypted and sent to theremote device1; this prevents malware or other unauthorised parties from possibly intercepting and decoding the PIN.
FIGS. 1 to 4 illustrate some examples of the various appearances that the scrambledkeypad images3 can be provided with in accordance with the invention.
By way of example,FIG. 2 shows a scrambledkeypad image3 having a background of autumn leaves. This can be used by the retailer for seasonal variations or can be used for advertising purposes.
FIG. 3 shows a black and white only image distorted so that it cannot be read by OCR software. The skilled addressee will be aware that such images require high resolution screens to display correctly.
FIG. 4 shows a monochrome keypad image that has been modified for the Arabic alphabet. The skilled addressee will appreciate that this regional difference in the characters can also be combined with the other imagery techniques methods illustrated inFIGS. 2 and 3.
On suitably powerful devices, a video overlay may be used instead of a static image to further decrease the potential that OCR software could be used to read the keypad. This feature could also be used for advertising purposes.
It is important that, in order to provide a necessary level of security, malware and unauthorised parties are not able to read the data contained in the scrambled keypad image displayed to the user. As described above, this is achieved by the invention by providing the scrambled keypad in a single image or picture format. While it is possible to OCR images on a microcomputer, mobile telephones do not have the capabilities to do this, and it would be almost impossible for hidden malware to possess the required level of sophistication without attracting detection.
This issue can, at least in part, be addressed by using random backgrounds and fonts which cannot be understood by OCR technologies. The problem could also be addressed by delivering the keypad image as a video file. While video files do not lend themselves to being read by OCR technologies it is technically possible for a third party to ‘grab’ a single screen from a video file and read it.
One solution which may be incorporated into various embodiments of the invention would be to combine the two afore-mentioned systems into one. Thus, the scrambled keypad image is presented to the user in a plain format (ie non special fonts are used and the background is ‘normal’) but the file itself is a small video file which, when played, tricks the eye into thinking that the image is solid and static. In reality no single frame contains enough information for it to be reverse engineered back into understandable, useable content.
The system can be achieved in as little as 3 frames, each played quickly and in succession so as to appear static. An example is given inFIG. 18. When combined into a video file the static word ‘Licentia’ is displayed but the individual images are unreadable by an OCR package.
Registration Process
This aspect of the invention is illustrated inFIG. 6.
In certain embodiments, adevice1 must be registered before it can be used with the system of the present invention and asmall application8 downloaded to thetarget device1. If the device being used is amobile phone1 then the update process can occur ‘Over The Air’ automatically; if the device is a fixed terminal then thesoftware8 may be downloaded over a fixed line, although it may alternatively be built into the device at the time of manufacture and simply updated if required.
To register amobile phone1 with the system the user would need to undertake a registration process comprising the following steps:
    • 1. Logo ontoregistration service9 via a web-based interface (e.g. web site)10
    • 2. Enter their personal details i.e. Name, Address, Postcode (ZIP), Phone Make Model, Email address, Mobile Phone Number
      • The nature and type of data required may be stipulated by the system operator and vary from country to country depending on the application with which the system is being used. Furthermore, registration data may already be held by the operator as the customer may be an existing client and therefore only the application may need to be pushed to the device.
    • 3. A link is then sent to themobile handset1 for the user to follow or theapplication8 is simply ‘pushed’ down to the handset.
      • When run for the first time, theapplication8 sets up thedevice1 and downloads any additional data which may be required, such as encryption keys etc. A custom keypad image database is also created on the server for the registered device (as shown inFIG. 7).
To register onto the system with a fixed device the user would complete a similar process as follows:
    • 1. Logo ontoregistration service9 via a web-basedinterface10
    • 2. Enter their personal details i.e. Name, Address, Postcode (ZIP), Phone Make Model, Email address
      • As above for the mobile phone, the required data would be dictated by the system operator.
    • 3. The device then connects to the server either via a fixed line or wireless and if required updates the internal application. Any additional data that is required, such as encryption keys etc., is downloaded. A custom keypad image database is also created on the server for the registered device (seeFIG. 7)
ConsiderFIG. 7. For both scenarios outlined above, for each device that is registered onto the system a custom database (or index)13 of keypad images is created from theMaster Database11. The Master Database consists of keypad images that have been generated specifically for the user's registered model of device to ensure optimal display. This database (or Index)11 is then randomized12 to ensure that no two devices have the same order of scrambled keypad images i.e. keypad ref ‘AXF015689.gif’ may be in location 65894 for one device but in position 125948 on another. Again, this enhances security.
It should be noted that in certain embodiments user registration may not be a requirement. This may be the case where the software is integrated into a 3rdparty application. In such embodiments, the required registration method may have been put in place by the third party.
Transaction Process
This aspect of the invention is illustrated inFIG. 8.
Upon successful registration of the user and device, transactions can be performed. An authentication (PIN request) can be initiated by several methods depending on the manner in which the system has been integrated with 3rdparty applications.
Typically integration occurs with 3rdparties who:
    • a. Manufacture card swipe or chip reading devices that are attached to the mobile device, or
    • b. Push financial information and subsequent payment request down to the handset i.e. toll road applications; or
    • c. Provide websites which require secure PIN entry to gain access to information when used in applications such as online banking access.
However, the invention is not intended to be limited in this regard and the nature of service or resources provided by the 3rdparty is not a limiting feature of the invention.
In all cases described above there is a common trigger for the PIN application to load and perform the subsequent PIN entry process.
Once a request for an image has been received by the server (which may be referred to as the ‘computer-based resource’) theincoming device1 is identified and authenticated and, if successful, the next keypad image from the device's ‘Index’13 is encrypted and transmitted to thedevice1. The keypad images are sent sequentially as per the devices ‘index2’ as shown initem13 ofFIG. 7 (in order from top to bottom) and are not reused.
Once theencrypted keypad image3 is received by thedevice1 it is decrypted and passed to the ‘Secure Terminal Application’.
Secure Terminal Application This aspect of the invention is illustrated inFIG. 9 andFIG. 10.
The ‘Secure Terminal Application’ is the program that resides on the target device/phone1 or the fixed terminal and is responsible for the secure input and transmission of the user's inputted PIN back to the server.
As described above, akeypad2 is created on the device in a 3×4 grid. Each hotspot is assigned a numerical character. The application then ‘overlays’ thisreference keypad2 with the randomisedkeypad representation3 that has been pre-generated and sent down to thehandset1. This scrambledkeypad representation3 has been generated to exactly the same dimensions as thekeypad2 underneath and perfectly overlays it, as described above.
Thus, when the user enters theirPIN number14 using the scrambledrepresentation3, a different, encoded output is generated. In the example below, if the user's PIN was ‘6725’ then the output from the keypad would be ‘0476’. It is the keypad output of ‘0476’ that is encrypted and sent back to the server's ‘Decryption Engine’.
Once the keypad has been pressed four times the scrambledkeypad image3 is securely wiped using a secure deletion algorithm from the protected memory where it resides.
The Decryption Engine
Once the central server (‘computer-based resource’) receives the incoming encoded and encrypted PIN from thehandset1 it must be converted back into the original user PIN.
This is done by the ‘Decryption Engine’ which is held on a separate secure server solely for this purpose. As described earlier, when thedevice1 identifies itself to the server and requests akeypad image3 the unique filename for the keypad image that was sent to thedevice1 is temporarily stored. This filename contains the order of the keys within the keypad i.e. for the keypad image shown inFIG. 9 the filename would be ‘0347152986’. This enables the mapping between the scrambled keypad image and the reference keypad to be recorded. For security purposes, the scrambledkeypad image3 is renamed before it is encrypted and sent to theremote device1.
When the encrypted PIN arrives the message is firstly decrypted using the shared key used for the handset/device (this may be Triple DES or Public Private Key, or whatever is deemed appropriate during development according to the handset).
Once the message has been decrypted the encoded PIN that was generated by the user input must be decrypted. To do this the filename of the keypad image that was sent is copied into a temporary array and then for each number that was generated by the user input the number in the corresponding array position is substituted, thus revealing the actual PIN number.
So for the example above where the user's PIN was 6725, the handset generated and transmitted an encrypted PIN of 0476.
Now when the filename of the keypad image that was sent is copied into the array ‘0347152986’ we get the data shown inFIG. 20A.
For each number in the generated PIN the ‘Array Position’ is located and the corresponding ‘Filename Character’ is substituted.
First Digit of PIN=0 (GOTO array position 0); First digit of user's PIN number=6 as shown inFIG. 20B.
Second Digit of PIN=4 (GOTO array position 4) Second digit of user's PIN number=7 as shown inFIG. 20C.
Third Digit of PIN=7 (GOTO array position 7) Third digit of user's PIN number=2 as shown inFIG. 20D.
Fourth Digit of PIN=6 (GOTO array position 6) Fourth digit of user's PIN number=5 as shown inFIG. 20E.
After the decryption process has been completed the user's ‘real’ input of 6725 is revealed. This PIN number 6725 is then encrypted using standard banking encryption and passed to the Acquirer or banking partner for processing. It should be noted that this is only further encrypted and passed to the acquirer in embodiments relating to a financial transaction. The data may or may not be further encrypted depending upon the nature and requires of the specific application.
The array is then securely erased to ensure security, along with any other temporary data.
It should be noted that in certain alternative embodiments, 12 smaller key pictures (one for each number or hotspot) may be provided. The phone or other device may be arranged to to select a random number and rearrange the individual pictures into a 3×4 array (and thus making up a virtual keypad on demand). However, such embodiments present potential security loopholes and may provide several access points for malware to obtain the user's PIN (as the handset/device would have to transmit the random number and thus the order of the PIN pad back to the server). Therefore, such an embodiment is suitable for applications where required security levels are somewhat relaxed.
It should also be noted that although the invention has been described above in respect of a mobile phone having a touch screen, other embodiments may comprise a different type of device. For example, in another embodiment the device could be a personal computer, or a laptop, or a tablet computer. The embodiment would function essentially as described above except that as general purpose computing devices, such as PCs, do not typically comprise a standard procedure call for generating a keypad as mobile phones do, the keypad zone and hotspots are specified by a purpose-built software component executing on the device. The software specifies the portion of the screen which makes up the keypad zone, and the locations of the sub-zones (keys) and their associated symbols within the keypad zone. The scrambled keypad image is displayed at that location to provide the superimposition technique described above. The underlying keypad is generated using the same (or substantially the same) procedure call used by the smart phone implementation.
In another embodiment, a terminal could be provided which resembles the known card-reading terminals used in retail environments. The terminal may comprise a touch screen and comprise internal components replicating those of a mobile telephone. Thus, the terminal can receive and send data as a phone can, and the terminal can function is accordance with the invention as described above in with reference to the target device being a mobile phone.
Thus, the invention can be configured for use with a variety of computing-related devices to equal effect.
In addition, the invention can be configured to include various features which further enhance the security of the user's data.
Watermarking
For example, so-called ‘man in the middle attacks’ are a known problem. This can be addressed in the present invention using a ‘watermark’ feature to demonstrate to the user (i.e. a retailer or possibly the end customer) that the input device is communicating with a legitimate party (e.g. the appropriate bank) and therefore that the scrambled keypad image has been sent by that legitimate party and not an imposter.
Such a feature may be implemented in a variety of ways. For example, when a retailer registers to use the system they choose and store a secret indicator (word, phrase, number, name, image etc.) that only they and the trusted party knows. Then, when a transaction is required the following process is performed:
    • 1. the consumer's card is read
    • 2. The transaction amount is entered
    • 3. the pin entry screen is displayed on the terminal
When the PIN entry screen is displayed the merchant must physically check that the pre-selected secret word etc that they registered is displayed on the screen before handing the terminal to the customer for their PIN entry. This is essentially the same principle which is employed in ssl technology wherein one looks for the small yellow lock icon as confirmation of the site's legitimacy.
By doing this, the responsibility is placed onto the merchant to ensure that the device is talking securely to a legitimate party. If a different indicator (watermark) is displayed from that which the merchant expects, or no indicator is shown at all, it can be assumed that the process has been compromised.
This watermark may stay on the screen for duration of the PIN entry by the consumer. However, it is preferable that it is only displayed for a short period of time (e.g. the region of a few seconds) and then disappears before it may be seen by any other person, such as the customer. If the watermark is seen by another person, this could allow them to perform a man in the middle attack.FIG. 15ashows a pre-generated pin pad picture that is blank. The system creates a new pin pad picture to include the user's secret word ‘jellybean’ which is then encrypted and sent to the device. This is shown inFIG. 15b.
Upon registration the user may also choose where to have the watermark displayed e.g. right, left, centre, top etc. A keypad image having the watermark in the bottom left corner is shown inFIG. 15c. In alternative versions, a text colour or font style, or size may also be chosen.
Moreover, the watermark does not have to be in textual form. In some embodiments, the user may upload a photograph or other file (for example, a family photo or a photo of the shop etc.) so that this picture is displayed in the background. This is illustrated inFIG. 15d.
This watermarking feature is suitable for employment with all embodiments of the invention, irrespective of the context in which the invention is used or the nature of the device used to display the keypad (e.g. online through a browser, via a terminal arranged for use with the invention, or a mobile phone etc.)
Additional PinPad Encryption
In order to further enhance the security of the system, the invention may employ one or more techniques for making it more difficult for an unauthorised party to figure out, discern or calculate the mapping between the displayed keypad image (i.e. the one that the user uses to enter his PIN) and the underlying keypad.
For example, if the user has selected a PIN which contains the same digit more than once (e.g. 1223) this may make it easier to compute the correlation between the input and the ‘underlying’ keypad.
One possible approach to overcoming this could be to create more than one underlying keypad. For example, a virtual keypad could be generated for each key press. An example is given below.
FIG. 16ashows a scrambled keypad image, andFIG. 16bshows an ‘underlying’ keypad. If the user's PIN is 1111 then the encoded PIN sent back to the server would be 9999. This provides a potential hacker with a starting point for an attempt at calculating or guessing the user's PIN.
However, if 4 different ‘underlying’ keypads are used instead of one, this problem is overcome. Thus, a sequence of digits can be sent to the target device (e.g. terminal, phone, PC) and the sequence is used by the target device to form the keypad. For the keypad inFIG. 16b, the sequence would be 3156790482. Using this approach, it is possible to generate a new keypad for each required key press.
Thus, the top pin pad as perFIG. 16ais sent to the target device as an image, in accordance with the description set out above. Then, 4 numeric sequences are sent for the creation of the underlying keypad e.g. 3156790482, 0746189352, 0347156289, 2581673904. This produces the keypads shown inFIGS. 16bto16e.
Suppose now that the user's input is 1111. Instead of 9999 being produced, the code 9857 is produced and sent back to the server for decryption. As the server ‘knows’ which scrambled keypad image was sent, and which sequences of digits, the resulting encoded PIN appears to be much more random and is therefore much harder to decipher by an interceptor. The decryption process at the server end remains as set out above.
Moreover, in order to enhance security further it is possible to use combinations of other characters in the generation of the keypads, not just characters. For example, the sequence Jg6KrBjoJ6 could be sent. This would generate the underlying keypad shown inFIG. 17.
In such an embodiment, the use of randomly generated strings of characters in the bottom keypad reduces the need to ‘filter’ the underlying keypads (as described above) to remove potentially unsuitable keypads which might provide an attacker with a possible starting point for an attack.
However in a preferred embodiment only 1.6 m scrambled (‘top’) keypad images are used rather than the possible 3.6 m and a check is still performed to ensure that no mapping is the same ie. 1=1 between the superimposed and the underlying keypads.
System Level Architecture
FIG. 19 illustrates one manner in which the invention may be implemented into a transaction system.
FIG. 19 includes the following system components, or modules.
Device app: an app that runs on a terminal or mobile phone to manage user interaction and technical process flow including initiating a payment transaction, interacting with card reader, requesting an oPinPad (i.e. scrambled keypad image), encrypting the entered oPin and sending the transaction online for authorization.
OPinPad Management Module: a stand-alone application module that runs in a central secure data center on a dedicated server. It holds a database of all oPinPad TIF images and manages distribution of the oPinPad TIFs on demand.
Auth Client: a stand-alone application module that runs in a central secure data center, possibly on the same server as the oPinPad Management Module (or, in some embodiments on its own dedicated server). It receives the message from the Device and prepares it to be sent to the Payments Switch for Authorisation.
HPSAM Appliance: a stand-alone application module that runs in central secure data centre on a dedicated server. In some embodiments the server may be security hardened.
InFIG. 19, the following terminology is used:
    • Device: Payment Terminal or Mobile Phone where payment transaction is taking place
    • oPin: “Obfuscated PIN”—the encoded PIN which is generated by the keys of the underlying Device keypad; this is not the actual cardholder's PIN
    • Real Pin: The real PIN associated with the consumer's card that would be ‘swapped’ for the oPin before being verified by the card issuer
    • oPinPad: Obfuscated Pin Pad (i.e. the scrambled keypad image)—the TIF image which is presented to the card holder to enter their PIN and having ‘keys’ in scrambled positions relative to the underlying Device keypad
    • oPinPad Array: Array to be used for mapping the oPin with the Real Pin, as described above
    • HPSAM: Hosted Payment Security Access Module
    • HSM: Hardware Security Module
    • Card Reader: The terminal/mobile device which contains or is connected to a Card Reader which retrieves payment card details from the consumer
    • Tag: Unique identification number assigned to the oPinPad to assist with later processing
    • ZMK: Zone Master Key.
Referring to the numeric references inFIG. 19, the process flow of the illustrative system is as follows:
0The device initiates a payment transaction and captures the Amount
(from the user interface) and Card Details (from the Card Reader).
Sensitive data from the Card Reader is encrypted before getting to the
App. The App goes online and requests an oPinPad from the server. If
possible the oPinPad would be requested at the same time as the card
details are retrieved from the Card Reader.
1The oPinPad Management Module retrieves an oPinPad (i.e.
scrambled keypad image) from a database and assigns it with a Tag.
The oPinPad TIF and the Tag (unique id) are sent back to the device.
2The oPinPad Array is sent to the HPSAM along with the Tag
(unique id). All traces of the Tag/Array combination are deleted
from the oPin Management Module (in particular from memory).
3The Device App displays the oPinPad TIF (scrambled keypad) image
on the device and gathers the oPin as described above; the oPin is
immediately encrypted using a field encryption method (such as
DUKPT). The whole authorization message is then sent to the
Auth Client for payments authorization (this message includes
the Amount, the encrypted card details and the encrypted oPin).
4The Auth Client gathers the transaction details and passes it on to the
Payments Switch.
5The Payments Switch intercepts the transaction during standard
routing processing so that the oPin can be replaced with the Real Pin.
This is done by sending the oPin with the Tag to the HPSAM.
6Using the Tag, the HPSAM retrieves the oPinPad Array and uses it to
map the oPin to the Real Pin. The Real Pin is immediately encrypted
using 3DES and a ZMK which is aligned with the Payments Switch.
7The Real Pin is sent back to the Payments Switch as a PinBlock and
is added to the transaction to make an industry standard Online Pin
payments authorization message (such as, for instance, an ATM
message).
8The Real Pin block is translated using an industry standard HSM
such that the encrypted Pin can be handled by the receiving
institution (Acquirer, Processor, Issuer).
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the invention as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The word “comprising” and “comprises”, and the like, does not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. In the present specification, “comprises” means “includes or consists of” and “comprising” means “including or consisting of”. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Claims (34)

We claim:
1. A method comprising:
generating, by an electronic device and for display within a keypad zone of a screen associated with the electronic device, an operable keypad by a procedure or method call;
generating, by a remote server, a plurality of images of scrambled keypads;
removing, by the remote server and from the plurality of images of scrambled keypads, any image that represents a scrambled keypad having at least one key in a same position as a respective key of the operable keypad to provide a remaining plurality of images;
selecting, by the remote server and from the remaining plurality of images, an image of a scrambled keypad;
sending, from the remote server and for delivery to the electronic device the image of the scrambled keypad;
outputting, by the electronic device and for display at least partially within the keypad zone, at least a portion of the image of the scrambled keypad; and
receiving, at the electronic device, by operation of at least one key of the operable keypad via the image of the scrambled keypad, an identifier.
2. A method according toclaim 1, wherein operation of at least one key of the operable keypad via the image of the scrambled keypad generates an encoded version of a user's intended input within the electronic device.
3. A method according toclaim 1, wherein the image of the scrambled keypad is electronically formed, including a graphical image, an optical image, a video or some other form of visual representation of a scrambled keypad.
4. A method according toclaim 1, wherein the keypad zone is a defined area or portion of the screen which covers a portion of the screen.
5. A method according toclaim 1, wherein the image of the scrambled keypad is displayed within the keypad zone such that as a user touches, clicks on or otherwise selects a location within the image of the scrambled keypad, an operable keypad key of the operable keypad at that location within the keypad zone is activated to provide an encoded version of the user's input.
6. A method according toclaim 1, wherein the image of the scrambled keypad is displayed such that the image of the scrambled keypad occupies the keypad zone exactly, completely or partially.
7. A method according toclaim 1, wherein the image of the scrambled keypad is displayed such that the image of the scrambled keypad appears to the user as an operable keypad with keys in a scrambled order or configuration with respect to the operable keypad of the electronic device.
8. A method according toclaim 1, wherein the image of the scrambled keypad functions as a mask or cover superimposed over the operable keypad such that a user's touching, clicking on or otherwise identifying a location within the image of the scrambled keypad operates the operable keypad key positioned at that location within the keypad zone.
9. A method according toclaim 1, wherein the keypad zone is a portion of the screen which is designated, prior to input of the identifier, as a keypad display area.
10. A method according toclaim 1, wherein the keypad zone and/or the image of the scrambled keypad remains in a fixed position on the screen during input of the identifier.
11. A method according toclaim 1, wherein the identifier is a Personal Identification Code or Personal Identification Number.
12. A method according toclaim 1, wherein the image of the scrambled keypad represents or depicts a scrambled keypad having at least one key which is positionally reordered or reconfigured relative to the layout of the keys in the operable keypad.
13. A method according toclaim 1, wherein all of the keys depicted in the image of the scrambled keypad are repositioned or re-ordered relative to the keys in the operable keypad.
14. A method according toclaim 1, wherein a user is enabled to input the identifier by interaction with the screen, such as by touching a portion of the screen and/or selecting an area of the screen using a pointing device such as a mouse or tracker ball.
15. A method according toclaim 1, wherein the keypad zone comprises a plurality of sub-zones or ‘hot spots’, each sub-zone corresponding to a key of the operable keypad.
16. A method according toclaim 15, wherein the image of the scrambled keypad is presented to the user such that a position of at least one key depicted in the image of the scrambled keypad corresponds to a position of a sub-zone, thus providing a mapping between the keys of the scrambled keypad depicted in the image and the plurality of sub-zones.
17. A method according toclaim 1, wherein a configuration or an order of the keys in the operable keypad is altered after at least part of the identifier has been inputted.
18. A method according toclaim 1, wherein an encoded version of a user's identifier is constructed within the electronic device from a plurality of keystrokes activated on the operable keypad in response to a click, touch or other indication made by the user in respect of the image of the scrambled keypad.
19. A method according toclaim 1, wherein the identifier inputted into the device is sent from the electronic device to a remote computer-based resource.
20. A method according toclaim 19, wherein the remote computer-based resource receives the inputted identifier and processes the identifier.
21. A method according toclaim 20, wherein the identifier is processed using a stored form or version of a configuration of the keys depicted in the image of the scrambled keypad.
22. A method according toclaim 21, wherein the stored form or version of the configuration of the keys is a filename.
23. A method according toclaim 22, wherein processing involves using the stored form or version of the configuration of the keys to provide a decoded version of the inputted identifier.
24. A method according toclaim 21, wherein the processed identifier is compared with a stored version of the identifier, and the inputted identifier is deemed to be verified when the processed identifier matches the stored version of the identifier.
25. A method according toclaim 1, wherein respective positions of all keys depicted in the image of the scrambled keypad remain unchanged relative to one another during input of the user's identifier.
26. A method according toclaim 1, wherein the symbol of at least one key in the image of the scrambled keypad is at least partially obscured or obfuscated but remains readable to the user.
27. A method according toclaim 1, wherein the electronic device is a mobile telephone, a PC, a tablet computer, a laptop, a PDA, a card-reading terminal, or a mobile phone within a housing such that the mobile phone resembles a card-reading or electronic point of sale device, or some other electronic device having communications capabilities.
28. A method according toclaim 1, wherein the image of the scrambled keypad is displayed via a web browser, or an application embedded within a browser, or a standalone software application, and/or an application providing a graphical user interface to allow a user to interact with the screen.
29. A method according toclaim 1, wherein the procedure or method call also specifies the position of the keypad zone on the screen, and/or the dimensions of the keypad zone.
30. A method according toclaim 1, wherein the image of the scrambled keypad and/or the keypad comprises numeric digits, alphabetical characters, symbols or any other indicia, or a combination thereof.
31. A method according toclaim 1, wherein the image of the scrambled keypad is erased from the electronic device following a user's input, or following a specified period of time.
32. A method according toclaim 1, wherein the inputted identifier is verified so as to control access to a resource such as a financial resource, a device, a building, an electronic resource, a medical resource, an information or data resource, or a computer-based resource.
33. A method according toclaim 1, wherein the screen comprises a touch screen.
34. A system comprising:
a remote computer-based resource being configured to:
generate a plurality of images of scrambled keypads;
remove, from the plurality of images of scrambled keypads, any image that represents a scrambled keypad having at least one key in a same position as a respective key of an operable keypad of an electronic device to provide a remaining plurality of images;
select, from the remaining plurality of images, an image of a scrambled keypad; and
send, for delivery to an electronic device, the image of the scrambled keypad; and
the electronic device having a screen, a processor and associated memory, the electronic device being configured to:
display an operable keypad within a keypad zone of the screen, wherein the operable keypad is generated by a procedure or method call;
output for display, at least partially within the keypad zone of the screen, at least a portion of the image of the scrambled keypad; and
receive, store and/or process an identifier inputted into the electronic device by operation of at least one key of the operable keypad via the image of the scrambled keypad.
US16/718,1582012-07-202019-12-17Authentication method and systemExpired - Fee RelatedUS11048783B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/718,158US11048783B2 (en)2012-07-202019-12-17Authentication method and system

Applications Claiming Priority (11)

Application NumberPriority DateFiling DateTitle
GB201212878AGB201212878D0 (en)2012-07-202012-07-20Authentication method and system
GB12128782012-07-20
GB1212878.12012-07-20
GB13060532013-04-04
GB1306053.82013-04-04
GB201306053AGB201306053D0 (en)2012-07-202013-04-04Authentication Method and System
PCT/GB2013/051913WO2014013252A2 (en)2012-07-202013-07-17Authentication method and system
US201514416054A2015-01-202015-01-20
US15/094,383US10366215B2 (en)2012-07-202016-04-08Authentication method and system
US15/197,086US10565359B2 (en)2012-07-202016-06-29Authentication method and system
US16/718,158US11048783B2 (en)2012-07-202019-12-17Authentication method and system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/197,086ContinuationUS10565359B2 (en)2012-07-202016-06-29Authentication method and system

Publications (2)

Publication NumberPublication Date
US20200201960A1 US20200201960A1 (en)2020-06-25
US11048783B2true US11048783B2 (en)2021-06-29

Family

ID=46881666

Family Applications (7)

Application NumberTitlePriority DateFiling Date
US14/416,054Expired - Fee RelatedUS9552465B2 (en)2012-07-202013-07-17Authentication method and system
US15/094,383ActiveUS10366215B2 (en)2012-07-202016-04-08Authentication method and system
US15/197,086Expired - Fee RelatedUS10565359B2 (en)2012-07-202016-06-29Authentication method and system
US16/718,158Expired - Fee RelatedUS11048783B2 (en)2012-07-202019-12-17Authentication method and system
US16/730,017Expired - Fee RelatedUS11048784B2 (en)2012-07-202019-12-30Authentication method and system
US16/776,195Active2033-08-09US11194892B2 (en)2012-07-202020-01-29Authentication method and system
US17/537,257AbandonedUS20220156350A1 (en)2012-07-202021-11-29Authentication method and system

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US14/416,054Expired - Fee RelatedUS9552465B2 (en)2012-07-202013-07-17Authentication method and system
US15/094,383ActiveUS10366215B2 (en)2012-07-202016-04-08Authentication method and system
US15/197,086Expired - Fee RelatedUS10565359B2 (en)2012-07-202016-06-29Authentication method and system

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US16/730,017Expired - Fee RelatedUS11048784B2 (en)2012-07-202019-12-30Authentication method and system
US16/776,195Active2033-08-09US11194892B2 (en)2012-07-202020-01-29Authentication method and system
US17/537,257AbandonedUS20220156350A1 (en)2012-07-202021-11-29Authentication method and system

Country Status (18)

CountryLink
US (7)US9552465B2 (en)
EP (3)EP3489918A1 (en)
JP (2)JP6364408B2 (en)
KR (1)KR101916173B1 (en)
CN (3)CN104584086B (en)
AU (4)AU2013291755B2 (en)
BR (1)BR112015000980B1 (en)
CA (1)CA2878728A1 (en)
GB (5)GB201212878D0 (en)
IL (2)IL236779A (en)
MX (2)MX354996B (en)
MY (1)MY171482A (en)
NZ (2)NZ744304A (en)
RU (2)RU2639674C2 (en)
SG (2)SG11201500411YA (en)
TW (1)TWI628555B (en)
WO (1)WO2014013252A2 (en)
ZA (1)ZA201409529B (en)

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9846866B2 (en)*2007-02-222017-12-19First Data CorporationProcessing of financial transactions using debit networks
GB201212878D0 (en)2012-07-202012-09-05Pike JustinAuthentication method and system
US10373149B1 (en)2012-11-122019-08-06Square, Inc.Secure data entry using a card reader with minimal display and input capabilities having a display
IN2013CH01162A (en)*2013-03-182015-08-14Ncr Corp
JP5796725B2 (en)*2013-03-222015-10-21カシオ計算機株式会社 Authentication processing apparatus, authentication processing method, and program
KR101492054B1 (en)*2013-11-082015-02-10한국정보통신주식회사Card reader, terminal and method for processing payment information thereof
US9613353B1 (en)2013-12-262017-04-04Square, Inc.Passcode entry through motion sensing
JP6326247B2 (en)*2014-02-272018-05-16沖電気工業株式会社 Information processing apparatus, information processing system, information processing method, and program
CN103905590B (en)*2014-04-222018-03-06锤子科技(北京)有限公司Mobile device and its dial panel
KR101514706B1 (en)2014-06-262015-04-23주식회사 하렉스인포텍Method of user authentication using a variable keypad and biometrics and, the system thereof
US9483653B2 (en)*2014-10-292016-11-01Square, Inc.Secure display element
US9430635B2 (en)2014-10-292016-08-30Square, Inc.Secure display element
US10673622B2 (en)2014-11-142020-06-02Square, Inc.Cryptographic shader in display hardware
JP6481487B2 (en)*2015-04-302019-03-13富士通コネクテッドテクノロジーズ株式会社 Information processing apparatus, input control program, and input control method
US10015364B2 (en)*2015-05-112018-07-03Pictureworks Pte LtdSystem and method for previewing digital content
GB201520741D0 (en)*2015-05-272016-01-06Mypinpad Ltd And Licentia Group LtdAuthentication methods and systems
CN104850770A (en)*2015-06-052015-08-19深圳市智诺微智能电子科技有限公司Gesture password input virtual keyboard and application method
KR101691173B1 (en)*2015-06-182016-12-30한국정보통신주식회사A portable terminal, a method for processing transaction information using it
KR101691172B1 (en)*2015-06-182016-12-30한국정보통신주식회사A portable terminal, a method for processing information using it
KR101691171B1 (en)*2015-06-182016-12-30한국정보통신주식회사A portable terminal, a method for processing card information using it
KR101691170B1 (en)*2015-06-182016-12-30한국정보통신주식회사A portable terminal, a method for processing card information using it
CN106485848B (en)*2015-08-312020-05-01崔胜辛Key input system and method using disposable keyboard
KR101710998B1 (en)*2015-09-232017-03-02주식회사 하렉스인포텍Method of user authentication using a variable keypad and, the system thereof
US9619802B1 (en)*2015-12-092017-04-11Square, Inc.Interception of touch pad events for handling in a secure environment
AU2016380914B2 (en)*2015-12-282021-01-07Mobeewave Systems UlcSystem for and method of authenticating a user on a device
JP6786272B2 (en)*2016-06-242020-11-18キヤノン株式会社 Image processing device, its control method, and computer program
EP3291504B1 (en)*2016-08-302020-03-11Wacom Co., Ltd.Authentication and secure transmission of data between signature devices and host computers using transport layer security
FR3058814B1 (en)*2016-11-152019-10-25Ingenico Group METHOD FOR PROCESSING TRANSACTIONAL DATA, COMMUNICATION TERMINAL, CARD READER AND CORRESPONDING PROGRAM.
FR3060171B1 (en)*2016-12-092019-08-02Ingenico Group METHOD OF SECURING DATA ENTRY, COMMUNICATION TERMINAL AND CORRESPONDING PROGRAM.
RU2634179C1 (en)2016-12-122017-10-24Акционерное общество "Лаборатория Касперского"Method and system for trusted information breakthrough to user
TWI621029B (en)*2017-05-022018-04-11Ctbc Bank Co Ltd Personal identity authentication method and system using graphic lock
KR101981992B1 (en)*2017-11-142019-05-24로움아이티 주식회사Method and apparatus for user authenticating using virtual keypad
US10869194B2 (en)2017-12-222020-12-15Dish Network L.L.C.Devices, systems, and processes for authenticating devices
EP3518130A1 (en)2018-01-302019-07-31OneVisage SAMethod and system for 3d graphical authentication on electronic devices
US10893041B2 (en)*2018-10-102021-01-12International Business Machines CorporationSingle use passcode authentication
US11010467B2 (en)*2018-10-302021-05-18Blue Popcon Co.LtdMultifactor-based password authentication
CN109934025A (en)*2018-12-262019-06-25电子科技大学 An automatic login method for bank security controls
TR201905756A2 (en)*2019-04-182019-05-21Kartek Kart Ve Bilisim Teknolojileri Ticaret Anonim Sirketi Software security system and method for PIN entry, storage and transmission to software-based POS (SoftPOS).
US11556628B2 (en)2019-04-302023-01-17International Business Machines CorporationMultidimensional attribute authentication
KR102266470B1 (en)*2019-06-112021-06-17주식회사 이니라인System and method for outputting character securely, and a recording medium having computer readable program for executing the method
CN110730162B (en)*2019-09-162022-03-18北京齐尔布莱特科技有限公司Page verification method, mobile terminal and readable storage medium
US11127410B2 (en)*2019-11-122021-09-21Wen-Ta ChiuVoice decoding device and method thereof
GB201916441D0 (en)2019-11-122019-12-25Mypinpad LtdComputer-implemented system and method
US11558375B1 (en)*2019-12-162023-01-17Trend Micro IncorporatedPassword protection with independent virtual keyboard
WO2021183073A1 (en)*2020-03-122021-09-16Kartek Kart Ve Bi̇li̇şi̇m Teknoloji̇leri̇ Ti̇caret Anoni̇m Şi̇rketi̇A secure payment system with emv card transaction flow and pin confirmation without sharing card information of the mobile phone, computer or tablet of the cardholder and a method thereof
EP3979102A1 (en)*2020-09-302022-04-06Rubean AGElectronic device for performing an authentication operation
WO2022172068A1 (en)*2021-02-102022-08-18Polu Vishwanath ReddySystem and method for user access control for accessing an authenticated entity
US11580210B2 (en)*2021-02-182023-02-14International Business Machines CorporationPassword authentication
US12141316B2 (en)2021-10-112024-11-12International Business Machines CorporationObfuscation of sensitive information through non-visual feedback
CN116049779A (en)*2022-12-052023-05-02中国建设银行股份有限公司上海市分行 Method, device, computing device and storage medium for password authentication

Citations (409)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB271884A (en)1926-05-251928-06-28Ig Farbenindustrie AgManufacture of ª‡-anthraquinonyl ketones
US2819067A (en)1955-12-221958-01-07Burroughs CorpCheck shingling machine
US3176324A (en)1963-01-111965-04-06American Metal ProdSpring construction
US3201732A (en)1959-09-251965-08-17Westinghouse Electric CorpWound magnetic core having turns which are given a predetermined set in radius before winding
US3255323A (en)1964-05-211966-06-07Edward C AustinAutomotive maintenance signalling device
US3270720A (en)1963-03-091966-09-06Daimler Benz AgRotary piston internal combustion engine
US3347103A (en)1964-11-271967-10-17Bendix CorpVelocity sensor
US3364601A (en)1966-01-191968-01-23Albert H. KorenekApparatus for excavating plants for transplanting
US3375428A (en)1964-02-041968-03-26Lorain Prod CorpRegulated rectifier circuit
US3392846A (en)1964-10-011968-07-16American Air Filter CoUnit filter assembly
US3413071A (en)1963-07-181968-11-26Davis ChesterHexamethyltriaminophenylfluorene printing composition and manifolding sheet therewith
US3621242A (en)1969-12-311971-11-16Bendix CorpDynamic field time-of-flight mass spectrometer
US3762876A (en)1971-10-071973-10-02Honeywell IncDriven vane anemometers
US3965066A (en)1974-03-151976-06-22General Electric CompanyCombustor-turbine nozzle interconnection
FR2622322A1 (en)1987-10-211989-04-28Weck Arnaud DeEncrypted keyboard system
EP0432409A1 (en)1989-12-051991-06-19Theodor Kromer GmbH & Co.KG Spezialfabrik für SicherheitsschlösserData input keyboard for coded locks or the like
DE4129202A1 (en)1991-09-031993-03-04Hauni Elektronik GmbhProtection circuit for personal identification number key=pad - uses number of keys to enter PIN value, with indicated values varying in pseudo-random manner
US5193152A (en)1989-11-031993-03-09Racal-Datacom, Inc.Network management system with group naming
US5209102A (en)1992-01-311993-05-11American Air LiquideMethod of introducing and controlling compressed gases for impurity analysis
WO1993011551A1 (en)1991-12-061993-06-10Maurras Jean FrancoisRendum reset keypad
US5219794A (en)1991-03-141993-06-15Hitachi, Ltd.Semiconductor integrated circuit device and method of fabricating same
US5234389A (en)1992-03-231993-08-10Ford Motor CompanyReleasable overrunning coupling power transmission mechanism acting in cooperation with a friction brake
US5257486A (en)1991-04-231993-11-02Adhesives Technology Corporation 1987Nozzle for injecting a sealant into a crack
US5363449A (en)1993-03-111994-11-08Tandem Computers IncorporatedPersonal identification encryptor and method
EP0662665A2 (en)1994-01-051995-07-12Transaction Technology, Inc.Wireless banking terminal using cellular telephone communication
US5434702A (en)1992-03-041995-07-18Northern Telecom LimitedOptical repeaters
US5504808A (en)1994-06-011996-04-02Hamrick, Jr.; James N.Secured disposable debit card calling system and method
US5549194A (en)1993-12-161996-08-27Joh. Winklhofer & SohneAccumulating conveyor chain
WO1997005578A1 (en)1995-07-281997-02-13Mytec Technologies Inc.Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
US5715078A (en)1994-03-241998-02-03Kabushiki Kaisha ToshibaOptical exposure unit and image forming unit used in optical exposure unit
US5754652A (en)1994-12-141998-05-19Lucent Technologies Inc.Method and apparatus for secure pin entry
EP0870222A2 (en)1995-08-211998-10-14Cornel SirbuConditional access method and device
DE19803339A1 (en)1998-01-291999-08-05Deutsche Telekom AgAccess authorization verification method for banking machine or computer system
US5949348A (en)1992-08-171999-09-07Ncr CorporationMethod and apparatus for variable keyboard display
US5990586A (en)1997-06-231999-11-23Seitz CorporationMulti-actuator having position controller
JP2000099801A (en)1998-09-242000-04-07Oki Electric Ind Co Ltd PIN input device
WO2000025474A1 (en)1998-10-262000-05-04Bradley Madison Company Doing Business As Evolv Adaptive TechnologyCryptographic protocol for financial transactions
JP2000165378A (en)1998-11-262000-06-16Kodo Ido Tsushin Security Gijutsu Kenkyusho:KkFingerprint authentication device
US6193152B1 (en)1997-05-092001-02-27Receiptcity.Com, Inc.Modular signature and data-capture system and point of transaction payment and reward system
US6209102B1 (en)1999-02-122001-03-27Arcot Systems, Inc.Method and apparatus for secure entry of access codes in a computer environment
US6219794B1 (en)1997-04-212001-04-17Mytec Technologies, Inc.Method for secure key management using a biometric
US6234389B1 (en)1998-04-292001-05-22@Pos.Com, Inc.PCMCIA-based point of sale transaction system
WO2001046922A2 (en)1999-12-202001-06-28Online Resources Corp.Method and apparatus for securely conducting financial transactions over an insecure network
US6257486B1 (en)1998-11-232001-07-10Cardis Research & Development Ltd.Smart card pin system, card, and reader
EP1161060A1 (en)1999-12-102001-12-05NTT DoCoMo, Inc.Mobile communication terminal and card information reader
FR2810067A3 (en)2000-04-102001-12-14Lundar Electric Ind Co LtdHinge for oven door has cut outs in door flanges fitting onto stubs on oven casing and retained by pins
FR2812423A1 (en)2000-07-262002-02-01Yohan AmsellemCard payment for an Internet transaction, uses code table prepared when card is manufactured with server interrogation of user who must return correct entries from the code table
US20020016918A1 (en)2000-05-122002-02-07David TuckerInformation security method and system
US20020023215A1 (en)1996-12-042002-02-21Wang Ynjiun P.Electronic transaction systems and methods therefor
US20020029342A1 (en)2000-09-072002-03-07Keech Winston DonaldSystems and methods for identity verification for secure transactions
US20020046185A1 (en)2000-08-302002-04-18Jean-Marc VillartSystem and method conducting POS transactions
US20020082962A1 (en)2000-07-272002-06-27Farris Robert G.Value transfer system for unbanked customers
FR2819067A1 (en)2000-12-292002-07-05Yakoubi BoualemMethod for controlling access to a secure system, such as an automatic teller machine, using a keyboard for PIN entry, where the values of the keys displayed on a touch screen are changed in a random manner to prevent fraud
DE10100188A1 (en)2001-01-042002-07-18Rohde & SchwarzSystem for encoding PIN code encodes code using biometric signal and stores it; stored encoded PIN code can only be read out of memory and decoded by using same biometric signal
US6434702B1 (en)1998-12-082002-08-13International Business Machines CorporationAutomatic rotation of digit location in devices used in passwords
US20020123972A1 (en)2001-02-022002-09-05Hodgson Robert B.Apparatus for and method of secure ATM debit card and credit card payment transactions via the internet
US20020129250A1 (en)2001-02-272002-09-12Akira KimuraAuthentication system and method, identification information inputting method and apparatus ands portable terminal
WO2002071177A2 (en)2001-03-032002-09-12Moneyhive.Com Pte LtdMethod and system for substantially secure electronic transactions
US20020188872A1 (en)2001-06-062002-12-12Willeby Tandy G.Secure key entry using a graphical user inerface
US20030004877A1 (en)2001-06-272003-01-02Fujitsu LimitedTransaction terminal apparatus
US20030002667A1 (en)2001-06-292003-01-02Dominique GougeonFlexible prompt table arrangement for a PIN entery device
US6549194B1 (en)1999-10-012003-04-15Hewlett-Packard Development Company, L.P.Method for secure pin entry on touch screen display
US20030120612A1 (en)2000-06-132003-06-26Kabushiki Kaisha EightingMethod of electronic settlement with a mobile terminal
US20030120936A1 (en)2001-08-012003-06-26Eft DatalinkEncryption of financial information
US20030132918A1 (en)2002-01-112003-07-17Fitch Timothy R.Ergonomically designed multifunctional transaction terminal
WO2003058947A2 (en)2001-12-262003-07-17Vivotech, Inc.Adaptor for magnetic stripe card reader
US6630928B1 (en)1999-10-012003-10-07Hewlett-Packard Development Company, L.P.Method and apparatus for touch screen data entry
GB2387702A (en)2002-04-172003-10-22Cellectivity LtdMethod of access control using PIN codes
GB2388229A (en)2002-05-042003-11-05Robert MacalonanKeypad for generating code with scrambled displayed key sequence
US20030212327A1 (en)2000-11-242003-11-13U-Systems Inc.Adjunctive ultrasound processing and display for breast cancer screening
JP2003346098A (en)2002-05-242003-12-05Fuji Xerox Co LtdPersonal identification system and method and terminal device for personal identification
US20030229597A1 (en)2002-06-052003-12-11Sun Microsystems, Inc., A Delaware CorporationApparatus for private personal identification number management
US20030229598A1 (en)2002-06-052003-12-11Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for protecting against side channel attacks against personal identification numbers
US20030229791A1 (en)2002-06-052003-12-11Sun Microsystems, Inc. A Delaware CorporationMethod for private personal identification number management
GB2389693A (en)2002-06-102003-12-17Consignia PlcPayment systems
US6671405B1 (en)1999-12-142003-12-30Eastman Kodak CompanyMethod for automatic assessment of emphasis and appeal in consumer images
US20040010690A1 (en)2000-11-112004-01-15Eon-Cheol ShinMethod and system for inputting secret information
US20040039933A1 (en)2002-08-262004-02-26Cricket TechnologiesDocument data profiler apparatus, system, method, and electronically stored computer program product
US20040044739A1 (en)2002-09-042004-03-04Robert ZieglerSystem and methods for processing PIN-authenticated transactions
US6715078B1 (en)2000-03-282004-03-30Ncr CorporationMethods and apparatus for secure personal identification number and data encryption
JP2004102460A (en)2002-09-062004-04-02Hitachi Software Eng Co LtdPersonal authentication method and program therefor
US20040073809A1 (en)2002-10-102004-04-15Wing Keong Bernard Ignatius NgSystem and method for securing a user verification on a network using cursor control
US20040122768A1 (en)2002-12-192004-06-24International Business Machines CorporationElectronic wallet for wireless computing device
US20040122771A1 (en)2002-12-192004-06-24International Business Machines CorporationAutomated teller machine for use with computing devices
DE10306352A1 (en)2003-02-152004-09-02Fuchsenberger, Walter, Dipl.-Ing. (FH)Code number input device for PIN or password in cash machine or access control system, randomly assigns symbols of keypad to individual keys, and resets after input process
US20040182921A1 (en)2000-05-092004-09-23Dickson Timothy E.Card reader module with account encryption
GB2402649A (en)2003-06-112004-12-15Mathew Jonathan DawsonPersonal identification code entry device
US20050010786A1 (en)2001-03-302005-01-13Michener John R.Trusted authorization device
US20050012715A1 (en)2003-06-122005-01-20Peter Charles Shann Hubird FordMethod, system, and software for interactive communication and analysis
US20050036611A1 (en)2003-03-312005-02-17Visa U.S.A., Inc.Method and system for secure authentication
US20050043997A1 (en)2003-08-182005-02-24Sahota Jagdeep SinghMethod and system for generating a dynamic verification value
US20050075973A1 (en)2000-08-222005-04-07Siamack YousofiValidation of transactions
JP2005107678A (en)2003-09-292005-04-21Nec CorpDevice, method and program for password authentication
US20050127158A1 (en)2003-12-152005-06-16Figueras Ilka H.Control card check
US20050127156A1 (en)2003-12-152005-06-16Samsung Electronics Co., Ltd.Portable handset having a radio frequency indentification(RFID) function and method using the same
US20050144449A1 (en)2003-12-302005-06-30Entrust LimitedMethod and apparatus for providing mutual authentication between a sending unit and a recipient
US20050140832A1 (en)2003-12-312005-06-30Ron GoldmanLaser projection display
US20050146447A1 (en)2004-01-052005-07-07Samsung Electronics Co., Ltd.Terminal having keyboard with keys variable in arrangement, and method of rearranging keys of keyboard
US20050177522A1 (en)2004-02-052005-08-11Sun Microsystems, Inc.Method and system for accepting a pass code
US20050193208A1 (en)2004-02-262005-09-01Charrette Edmond E.IiiUser authentication
US20050212763A1 (en)2004-03-262005-09-29Cannon Kabushiki KaishaInformation processing apparatus and method
WO2005104428A2 (en)2004-04-232005-11-03Virtual Fonlink, Inc.Enhanced system and method for wireless transactions
EP1599786A2 (en)2003-02-252005-11-30Banco Ita S.A.Virtual keyboard
EP1600847A1 (en)2004-05-172005-11-30Ahmed MerroukUniversal device for secure input of confidential data
US20060003706A1 (en)2004-06-302006-01-05Welland David RRatiometric transmit path architecture for communication systems
EP1615181A1 (en)2004-07-092006-01-11Tricerion LtdA method of secure data communication
US6990586B1 (en)2000-06-022006-01-24International Business Machines Corp.Secure data transmission from unsecured input environments
US20060018467A1 (en)2004-07-202006-01-26Scribocel, Inc.Device for authentication and identification for computerized and networked systems
WO2006010058A2 (en)2004-07-072006-01-26Bharosa Inc.Online data encryption and decryption
US20060017691A1 (en)2004-07-232006-01-26Juan Manuel Cruz-HernandezSystem and method for controlling audio output associated with haptic effects
US20060026440A1 (en)2002-05-312006-02-02Jean-Paul SauveboisMethod for securing an on-line transaction
US20060032705A1 (en)2004-08-162006-02-16Isham William RLightweight composite ladder rail having supplemental reinforcement in regions subject to greater structural stress
US7003316B1 (en)2002-02-222006-02-21Virtual Fonlink, Inc.System and method for wireless transactions
US7010806B2 (en)2001-05-182006-03-07Sun Microsystems, Inc.Dynamic downloading of keyboard keycode data to a networked client
US20060053301A1 (en)2002-12-232006-03-09Hwa-Shik ShinDevice and method for inputting password using random keypad
US7047222B1 (en)1997-08-062006-05-16International Business Machines CorporationSecure encryption of data packets for transmission over unsecured networks
US20060136334A1 (en)2004-11-292006-06-22Atkinson Steven PElectronic system for provision of banking services
US20060133597A1 (en)2004-12-082006-06-22Song Seung MSystem for protecting personal information of a customer when receiving on-line services from a service provider
WO2006064241A2 (en)2004-12-162006-06-22Mark Dwight BedworthUser validation using images
US20060146169A1 (en)2005-01-032006-07-06Yosef SegmanElectronic viewing device
US20060149845A1 (en)2004-12-302006-07-06Xinnia Technology, LlcManaged quality of service for users and applications over shared networks
US20060155619A1 (en)2002-09-272006-07-13Rhiando Maxwell EIdentification system
US7091845B2 (en)2003-09-052006-08-15Hirsch Electronics CorporationData entry systems with biometric devices for security access control
US7092915B2 (en)2002-01-072006-08-15International Business Machines CorporationPDA password management tool
US20060182715A1 (en)2002-09-272006-08-17Alfred SandrockTherapies for chronic inflammatory demyelinating polyneuropathy using interferon-ss
JP2006243938A (en)2005-03-012006-09-14Oki Electric Ind Co LtdPassword input device
WO2006095203A1 (en)2005-03-072006-09-14Tricerion LtdA method of secure data communication
US20060206919A1 (en)2005-03-102006-09-14Axalto SaSystem and method of secure login on insecure systems
US20060221059A1 (en)2005-04-012006-10-05Samsung Electronics Co., Ltd.Portable terminal having display buttons and method of inputting functions using display buttons
US20060224523A1 (en)2005-03-312006-10-05Elvitigala Rajith TDynamic keypad
US20060247533A1 (en)2005-04-272006-11-02Sony CorporationPseudorandom number generation apparatus, pseudorandom number generation method and program
GB2427059A (en)2005-06-062006-12-13Bristol Office MachinesPortable transaction processing device
US20070005500A1 (en)2005-06-202007-01-04Microsoft CorporationSecure online transactions using a captcha image as a watermark
EP1742450A2 (en)2005-07-052007-01-10Sony Ericsson Mobile Communications Japan, Inc.Method and mobile terminal device with biometric encrypted personal identification number
US20070014415A1 (en)2005-06-162007-01-18Harrison Keith AQuantum key distribution method and apparatus
US20070073937A1 (en)*2005-09-152007-03-29Eugene FeinbergContent-Aware Digital Media Storage Device and Methods of Using the Same
US20070089164A1 (en)2005-10-182007-04-19Gao Jie JSystem and method of alternative key pad layout for enhanced security
US20070101150A1 (en)2005-11-022007-05-03Konica Minolta Business Technologies, Inc.Information processing apparatus
US20070110224A1 (en)2005-11-142007-05-17Accenture Global Services GmbhData masking application
WO2007056746A2 (en)2005-11-082007-05-18Ultra-Scan CorporationSystem and method for providing security
US7243237B2 (en)2003-05-022007-07-10Microsoft CorporationSecure communication with a keyboard or related device
US20070182715A1 (en)2006-02-032007-08-09Research In Motion LimitedConfigurable handheld electronic device
US20070209014A1 (en)2006-01-112007-09-06Youssef YoumtoubMethod and apparatus for secure data input
US20070213090A1 (en)2006-03-072007-09-13Sony Ericsson Mobile Communications AbProgrammable keypad
EP1840778A1 (en)2006-03-292007-10-03Laurent BusserSingle-use identification device
US7305565B1 (en)2000-05-312007-12-04Symbol Technologies, Inc.Secure, encrypting pin pad
CN101082948A (en)2007-07-052007-12-05上海麦柯信息技术有限公司Portable anti-peeping safety keyboard and method of use thereof
US20070282756A1 (en)2006-06-022007-12-06First Data CorporationPin creation system and method
US20070279391A1 (en)2006-06-062007-12-06Marttila Charles AKeypad with virtual image
GB2438886A (en)2006-06-102007-12-12Gina Maria EldonRandom personal identification number input screen
WO2007143740A2 (en)2006-06-082007-12-13Mastercard International IncorporatedAll-in-one proximity payment device with local authentication
US20080014818A1 (en)2006-07-122008-01-17Marc PriviteraPost conversion nonwovens processing
US20080011098A1 (en)2006-06-292008-01-17Krohne AgA heated pipe connecting device for installation of a flow meter
CN101126967A (en)2007-09-112008-02-20卢心东Password input unit
CN201035502Y (en)2006-12-282008-03-12上海麦柯信息技术有限公司Safety accidental dynamic soft keyboard
US20080110981A1 (en)*2006-11-132008-05-15Gilbarco Inc.Projected user input device for a fuel dispenser and related applications
US20080148186A1 (en)2006-12-182008-06-19Krishnamurthy Sandeep RamanSecure data entry device and method
US7395506B2 (en)2004-05-102008-07-01Microsoft CorporationSpy-resistant keyboard
US20080165035A1 (en)2007-01-102008-07-10Bhella Kenneth SMethod and System for Customizing Keyboard Map Variants
US20080168546A1 (en)2007-01-102008-07-10John AlmeidaRandomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device
US20080184036A1 (en)2007-01-312008-07-31Microsoft CorporationPassword authentication via a one-time keyboard map
US20080209223A1 (en)2007-02-272008-08-28Ebay Inc.Transactional visual challenge image for user verification
CN201111222Y (en)2007-06-082008-09-03北京工业大学 Smart Security Keyboard
JP2008204409A (en)2007-02-232008-09-04Oki Electric Ind Co LtdPassword input display device and method
US20080251969A1 (en)2007-02-162008-10-16Isham William RBladder Molding Systems and Methods For Fabricating Composite Articles
US20080280652A1 (en)2007-05-082008-11-13Firefly Mobile, Inc.Reconfigurable keypad method in handset device operable with plural subsystems
US20080289035A1 (en)2007-05-182008-11-20International Business Machines CorporationMethod and system for preventing password theft through unauthorized keylogging
US20080306995A1 (en)2007-06-052008-12-11Newell Catherine DAutomatic story creation using semantic classifiers for images and associated meta data
US20080319902A1 (en)2005-11-182008-12-25Mark Mervyn ChazanMethod and Apparatus for Facilitating a Secure Transaction
WO2009000223A2 (en)2007-06-272008-12-31Universität TübingenDevice and method for tap-proof and manipulation-proof encoding of online accounts
WO2009009788A1 (en)2007-07-122009-01-15Jobmann Brian CIdentity authentication and secured access systems, components, and methods
WO2009012326A1 (en)2007-07-162009-01-22Qualcomm IncorporatedMethods and systems personalizing and branding mobile device keypads
US20090033522A1 (en)2007-07-302009-02-05Palm, Inc.Electronic Device with Reconfigurable Keypad
US20090044282A1 (en)2007-08-092009-02-12Technology Properties LimitedSystem and Method for Generating and Displaying a Keyboard Comprising a Random Layout of Keys
US20090067627A1 (en)2005-11-042009-03-12Christian HoglMethod and System for Transmitting Data From a First Data Processing Device to a Second Data Processing Device
US20090066660A1 (en)2007-09-062009-03-12Ure Michael JInterface with and communication between mobile electronic devices
US20090077383A1 (en)2007-08-062009-03-19De Monseignat BernardSystem and method for authentication, data transfer, and protection against phishing
US20090106827A1 (en)2007-10-222009-04-23International Business Machines CorporationSystem and method for user password protection
FR2923034A1 (en)2007-10-262009-05-01Ingenico SaPayment terminal e.g. computer, for e.g. automatic fuel vending machine, has memory storing program for modifying keyboard configuration data before inputting information and controlling displaying of configuration after modifying data
GB2454459A (en)2007-11-062009-05-13Andrew SmallPersonal identification code entry device
US20090183098A1 (en)2008-01-142009-07-16Dell Products, LpConfigurable Keyboard
US20090193210A1 (en)2008-01-292009-07-30Hewett Jeffrey RSystem for Automatic Legal Discovery Management and Data Collection
GB2457733A (en)2008-02-252009-08-26Mobank LtdSecuring inputting of sensitive information
US20090213132A1 (en)2008-02-252009-08-27Kargman James BSecure computer screen entry system and method
JP2009199581A (en)2008-01-212009-09-03Nec CorpPersonal identification number input device, method, and program, and cellular phone
US20090235199A1 (en)2008-03-122009-09-17International Business Machines CorporationIntegrated masking for viewing of data
US20090254986A1 (en)2008-04-082009-10-08Peter William HarrisMethod and apparatus for processing and displaying secure and non-secure data
JP2009237774A (en)2008-03-262009-10-15Advanced Media IncAuthentication server, service providing server, authentication method, communication terminal, and log-in method
DE102008050609A1 (en)2008-04-092009-10-22Kevin WesselActuating device for keypad of automated teller machine, has encoding device arranged between input keypad and actuating unit for another keypad, where encoding device comprises hydraulic and/or pneumatic unit
WO2009130985A1 (en)2008-04-232009-10-29コニカミノルタホールディングス株式会社Information input system
US20090270078A1 (en)2006-05-302009-10-29Gi-Seon NamMethod for configurating keypad of terminal and the terminal and system including the terminal and the keypad capable of reconfiguration
US20090277968A1 (en)2006-09-072009-11-12Matthew WalkerVisual code transaction verification
KR20090130455A (en)2008-06-162009-12-24성균관대학교산학협력단 How to change graphic keypad, key layout of graphic keypad, password authentication using graphic keypad
EP2141647A1 (en)2008-06-302010-01-06Accullink LLCSystems and methods for secure pin-based transactions via a host based pin pad
CN100583113C (en)2003-09-192010-01-20谢道裕Magic square digital antifake method and its antifake system
US20100036783A1 (en)2008-08-062010-02-11Rodriguez Ralph AMethod of and apparatus for combining artificial intelligence (AI) concepts with event-driven security architectures and ideas
US20100049768A1 (en)2006-07-202010-02-25Robert James CAutomatic management of digital archives, in particular of audio and/or video files
US20100098300A1 (en)2005-08-052010-04-22Tilman OttoMethod and system for biometric identification or verification
US20100109920A1 (en)2008-11-052010-05-06Michael Dennis SpradlingSecurity - input key shuffle
DE102008056605A1 (en)2008-11-102010-05-12Borchert, Bernd, Dr.Method for manipulation-secure transmission of e.g. password, from client to server via computer network, for online-banking, involves reconstructing code word, and declining execution of transaction by server
US20100117792A1 (en)2008-11-132010-05-13Patrick FaithDevice including authentication glyph
US20100121737A1 (en)2007-01-122010-05-13Kenji YoshidaPersonal identification number code input method using dot pattern, personal identification number code input method, and internet shopping settlement system
US20100125509A1 (en)2008-11-142010-05-20Kranzley Arthur DMethods and systems for secure mobile device initiated payments using generated image data
US20100138666A1 (en)2008-12-012010-06-03Neil Patrick AdamsSimplified multi-factor authentication
US7735121B2 (en)2003-01-072010-06-08Masih MadaniVirtual pad
JP2010126913A (en)2008-11-252010-06-10Alpha CorpElectronic lock device and locker equipment
US20100149100A1 (en)2008-12-152010-06-17Sony Ericsson Mobile Communications AbElectronic Devices, Systems, Methods and Computer Program Products for Detecting a User Input Device Having an Optical Marker Thereon
US20100153270A1 (en)2006-11-272010-06-17Broca Communications LimitedAuthentication of message recipients
US20100175016A1 (en)2009-01-062010-07-08Wei Cheng TianSecurity key inputting system for touch screen device
US20100174653A1 (en)2009-01-072010-07-08Tian WeichengSecure method and device of financial transaction
US20100180336A1 (en)2009-01-132010-07-15Nolan JonesSystem and Method for Authenticating a User Using a Graphical Password
US20100182244A1 (en)2007-02-282010-07-22Ntt Docomo, Inc.Information processing device and program
US20100186076A1 (en)2006-03-312010-07-22Axalto SaMethod and system of providing security services using a secure device
US20100215270A1 (en)2009-02-262010-08-26Pradheesh ManoharSystem and Methods for Automatically Accessing a Web Site on Behalf of a Client
DE102009022845A1 (en)2008-08-152010-09-02Günzel, AndreaMethod for input of personal identification number keyboard for input of personal identification number, involves defining number allocation to individual push buttons or pressure zones with each input of chip or magnetic card in associated
US20100223663A1 (en)2006-04-212010-09-02Mitsubishi Electric CorporationAuthenticating server device, terminal device, authenticating system and authenticating method
US20100242104A1 (en)2009-03-232010-09-23Wankmueller John RMethods and systems for secure authentication
US20100259561A1 (en)2009-04-102010-10-14Qualcomm IncorporatedVirtual keypad generator with learning capabilities
US20100287097A1 (en)2009-05-082010-11-11Bank Of America CorporationConducting Commercial Transactions with a Mobile Device
US20100287382A1 (en)2009-05-072010-11-11John Charles GyorffyTwo-factor graphical password for text password and encryption key generation
WO2010131218A1 (en)2009-05-152010-11-18Setcom (Pty) LtdSecurity system and method
WO2010134808A1 (en)2009-05-202010-11-25Bell Identification B.V.Method of securing entry of an alphanumeric code on a computer system, interaction and dedicated driver entity therefor.
US20100306283A1 (en)2009-01-282010-12-02Digitiliti, Inc.Information object creation for a distributed computing system
DE102009023925A1 (en)2009-06-042010-12-09Jan FrickeSensible data i.e. personal identification number, inputting device for e.g. automated teller machine, has display comprising number pad, and vision protection filter permitting vision of user on umber pad only from angle of vision
US20100323617A1 (en)2008-03-252010-12-23Logomotion, S.R.O.Method, connection and data carrier to perform repeated operations on the key-board of mobile communication device
US20110004769A1 (en)2009-07-032011-01-06Yoo-Jae WonPassword input system using an alphanumeric matrix and password input method using the same
US20110020414A1 (en)2009-07-272011-01-27Audrey KuninMoisturizing retinol composition
US20110018033A1 (en)2008-03-262011-01-27Sumitomo Chemical Company, LimitedSemiconductor wafer, semiconductor device, and method of manufacturing a semiconductor device
US20110055084A1 (en)2009-08-312011-03-03Saheednanda SinghTechniques for remote controlled physical transactions with dynamic key generation and authentication
US20110090097A1 (en)2009-10-202011-04-21Beshke Thomas CKeyless entry with visual rolling code display
US20110109567A1 (en)2009-11-092011-05-12Kim Hyun-KookMobile terminal and displaying device thereof
US20110144586A1 (en)2009-07-302011-06-16Tandem Diabetes Care, Inc.Infusion pump system with disposable cartridge having pressure venting and pressure feedback
US20110185319A1 (en)2010-01-282011-07-28Giovanni CarapelliVirtual pin pad for fuel payment systems
US20110180336A1 (en)2008-09-302011-07-28Toyota Jidosha Kabushiki KaishaVehicle motor driving system
US20110185313A1 (en)2010-01-262011-07-28Idan HarpazMethod and system for customizing a user-interface of an end-user device
US7992007B2 (en)2002-02-052011-08-02Cardinalcommerce CorporationDynamic pin pad for credit/debit/ other electronic transactions
WO2011093998A1 (en)2010-01-272011-08-04Rem Holdings 3, LlcCard reader device and method of use
US20110191591A1 (en)2008-07-082011-08-04Li ChengTransmitting Information Using Virtual Input Layout
US20110199387A1 (en)2009-11-242011-08-18John David NewtonActivating Features on an Imaging Device Based on Manipulations
US20110204140A1 (en)2009-11-242011-08-25Hart Annmarie DSystem and method for conducting secure pin debit transactions
EP2365469A1 (en)2010-03-102011-09-14Telecash Spólka z Ograniczona OdpowiedzialnosciaMethod for performing payment transaction using personal mobile device and arrangement for personal mobile device
US20110246369A1 (en)2010-03-302011-10-06De Oliveira Marcelo GomesEvent access with data field encryption for validation and access control
US20110281630A1 (en)2009-01-302011-11-17Omarco Networks Solutions LimitedMultifunction authentication systems
DE102010022368A1 (en)2010-06-012011-12-01Frank KnopfTouch-screen control panel for e.g. automated teller machine, has number arrangement that ranges between specific values, where arrangement is not rigid and changes each time before operating system configuration
WO2011155915A1 (en)2010-06-102011-12-15Woronec John SMethod and apparatus for securely activating a credit card for a limited period of time
FR2961330A1 (en)2010-06-142011-12-16Jean Claude PaillesMethod for securing electronic transaction between user of e.g. personal computer and goods or service merchant during purchasing of train tickets, involves assuring coherence between constitutive elements of contract and signed message
US20110313871A1 (en)2010-05-182011-12-22Laura GreenwoodApparatus, system, and method for facilitating a payment
US20110310019A1 (en)2010-06-162011-12-22International Business Machines CorporationReconfiguration of virtual keyboard
EP2400426A1 (en)2009-01-302011-12-28Research In Motion LimitedSystem and method for access control in a portable electronic device
US20110321138A1 (en)2010-06-282011-12-29International Business Machines CorporationMask Based Challenge Response Test
WO2012004395A1 (en)2010-07-092012-01-12Izettle Hardware AbStand-alone secure pin entry device for enabling emv card transactions with separate card reader
WO2012009334A1 (en)2010-07-132012-01-19Kopin CorporationPersonal secure terminal with virtual keypad
US8117458B2 (en)2006-05-242012-02-14Vidoop LlcMethods and systems for graphical image authentication
US20120042365A1 (en)2010-08-112012-02-16Emc CorporationDisposable browser for commercial banking
CN202150070U (en)2010-12-142012-02-22深圳市中成汇实业有限公司Personal on-line transaction terminal
US20120079273A1 (en)2010-09-282012-03-29Mu Hua Investments LimitedBiometric Key
US20120095867A1 (en)2010-10-132012-04-19Mckelvey JimIntegrated read head device
US20120096277A1 (en)2009-04-202012-04-19Alter Core, S.L.System and method for personal authentication using a mobile device
US20120098750A1 (en)2010-10-222012-04-26Southern Methodist UniversityMethod for subject classification using a pattern recognition input device
US8176324B1 (en)2009-07-022012-05-08Exelis Inc.Method and system for a secure virtual keyboard
EP2458491A2 (en)2010-11-292012-05-30Wincor Nixdorf International GmbHDevice for reading magnetic strips and/or chip cards with touch-screen for PIN entry
WO2012077098A1 (en)2010-12-062012-06-14Deutsche Telekom AgA method for authentication and verification of user identity
US8201732B1 (en)2010-04-122012-06-19Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
EP2466515A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer orientation-changing password
EP2466514A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer multi-point or randomized passwords
EP2466517A1 (en)2010-12-162012-06-20Research In Motion LimitedSimple algebraic and multi-layered passwords
EP2466520A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer multi-point or pathway-based passwords
EP2466512A1 (en)2010-12-162012-06-20Research In Motion LimitedPressure sensitive multi-layer passwords
EP2466516A1 (en)2010-12-162012-06-20Research In Motion LimitedAdjusting the position of an endpoint reference for increasing security during device log-on
EP2466513A1 (en)2010-12-162012-06-20Research In Motion LimitedVisual or touchscreen password entry
EP2466519A1 (en)2010-12-162012-06-20Research In Motion LimitedPassword entry using moving images
EP2466521A1 (en)2010-12-162012-06-20Research In Motion LimitedObscuring visual login
EP2466518A1 (en)2010-12-162012-06-20Research In Motion LimitedPassword entry using 3D image with spatial alignment
US20120158672A1 (en)2010-12-162012-06-21Microsoft CorporationExtensible Pipeline for Data Deduplication
US20120159593A1 (en)2010-12-162012-06-21Research In Motion LimitedMulti-layer orientation-changing password
US20120159160A1 (en)2010-12-212012-06-21Poisner David IHigh security display of private data
US20120159582A1 (en)2010-12-162012-06-21Research In Motion LimitedObscuring visual login
US20120159616A1 (en)2010-12-162012-06-21Research In Motion LimitedPressure sensitive multi-layer passwords
US20120159592A1 (en)2010-12-162012-06-21Research In Motion LimitedMulti-layered color-sensitive passwords
US20120159614A1 (en)2010-12-162012-06-21Research In Motion LimitedSimple algebraic and multi-layer passwords
US20120159609A1 (en)2010-12-162012-06-21Research In Motion LimitedPassword entry using moving images
US20120159613A1 (en)2010-12-162012-06-21Jason Tyler GriffinMulti-layer multi-point or randomized passwords
US20120159594A1 (en)2010-12-162012-06-21Research In Motion LimitedAdjusting the position of an endpoint reference for increasing security during device log-on
US20120159583A1 (en)2010-12-162012-06-21Research In Motion LimitedVisual or touchscreen password entry
FR2969342A1 (en)2010-12-212012-06-22Oberthur TechnologiesMethod for entering confidential code to device e.g. computer, to authenticate user, involves selecting character based on time of detection switching of input button, and forming ring for entering each letter in confidential code
US20120162086A1 (en)2010-12-272012-06-28Samsung Electronics Co., Ltd.Character input method and apparatus of terminal
JP2012138011A (en)2010-12-272012-07-19Ns Solutions CorpInformation processing system, information processing method and program
US20120185398A1 (en)2009-09-172012-07-19Meir WeisMobile payment system with two-point authentication
EP2487620A1 (en)2010-12-162012-08-15Research In Motion LimitedMulti-layered color-sensitive passwords
US8255323B1 (en)2009-01-092012-08-28Apple Inc.Motion based payment confirmation
US20120222100A1 (en)2011-02-242012-08-30International Business Machines CorporationAdvanced captcha using integrated images
US20120222102A1 (en)2011-02-242012-08-30Empire Technology Development LlcAuthentication using mobile devices
US8270720B1 (en)2006-02-212012-09-18Gruntworx, LlcMethod and system for secure data entry
US20120249295A1 (en)2011-03-302012-10-04Acer IncorporatedUser interface, touch-controlled device and method for authenticating a user of a touch-controlled device
WO2012131420A1 (en)2011-03-312012-10-04Infosys LimitedSystem and method for utilizing a dynamic virtual keyboard
US20120253971A1 (en)2011-03-282012-10-04Ebay Inc.Simplified orders using words or phrases
US20120256723A1 (en)2011-04-082012-10-11Avaya Inc.Random location authentication
JP2012194648A (en)2011-03-152012-10-11Nec Personal Computers LtdAuthentication server, authentication system and authentication method of server
US20120260326A1 (en)2011-04-052012-10-11Sap AgImage maps for credential-based security
EP2512090A1 (en)2011-04-142012-10-17Telefónica Germany GmbH & Co. OHGMethod for authenticating a subscriber
US8297173B1 (en)2007-01-102012-10-30Wilcox Industries Corp.Modular weapon video display system
WO2012146587A1 (en)2011-04-272012-11-01Vance BurkillImprovements in or relating to password generation and recall
EP2523137A1 (en)2011-05-092012-11-14Research In Motion LimitedTouchscreen password entry
US20120291120A1 (en)2011-05-092012-11-15Research In Motion LimitedTouchscreen password entry
US20120305648A1 (en)2011-06-032012-12-06Liquid Payment Solutions Pte LtdHybrid Mobile Phone/Pin Entry Device, System, Method and Article
US20120311723A1 (en)2011-05-062012-12-06Google Inc.Physical Confirmation For Network-Provided Content
US20120313858A1 (en)2011-06-102012-12-13Samsung Electronics Co., Ltd.Method and apparatus for providing character input interface
US20120323788A1 (en)2002-02-052012-12-20Cardinalcommerce CorporationDynamic pin pad for credit/debit/other electronic transactions
US20130019320A1 (en)2011-07-132013-01-17Salesforce. Com, Inc.Mechanism for facilitating management of data in an on-demand services environment
US20130018800A1 (en)2011-07-152013-01-17Rangaraju DevarajuSecure Authorization of a Financial Transaction
WO2013013192A2 (en)2011-07-202013-01-24Visa International Service AssociationCryptographic expansion device and related protocols
US20130021233A1 (en)2011-07-212013-01-24Frederick UmmingerApparatus, system, and method for providing feedback sensations of temperature and hardness-softness to a controller
US20130020389A1 (en)2011-07-182013-01-24Barnett Timothy WSystems and methods for authenticating near field communcation financial transactions
US20130023240A1 (en)2011-05-172013-01-24Avish Jacob WeinerSystem and method for transaction security responsive to a signed authentication
US8364601B2 (en)2008-12-312013-01-29Intel CorporationMethods and systems to directly render an image and correlate corresponding user input in a secure memory domain
US20130026513A1 (en)2011-07-252013-01-31Deeder AurongzebOled assembly and luminaire with removable diffuser
US20130029824A1 (en)2011-07-272013-01-31Flexicell Inc.Tier cap forming apparatus
US8375428B2 (en)2009-07-032013-02-12Korea Internet & Security AgencyPassword input system using alphanumeric matrices and password input method using the same
WO2013021233A1 (en)2011-08-052013-02-14Mt Bilgi Teknolojileri Dis Tic, A.S.Multi-communication featured, touch-operated or keyboard cash register with contact and non-contact credit card reader
US20130042318A1 (en)2010-04-292013-02-14Rakesh ThathaAuthentication System and Method Using Arrays
US20130047237A1 (en)2010-04-262013-02-21Kyu Choul AhnPassword security input system using shift value of password key and password security input method thereof
US20130050088A1 (en)2011-08-292013-02-28Ncr CorporationUser interface
US20130060739A1 (en)2011-09-012013-03-07Microsoft CorporationOptimization of a Partially Deduplicated File
US20130078951A1 (en)2011-09-232013-03-28Jaeseung MUNMobile terminal and method of providing security thereto
US8413071B2 (en)2009-09-152013-04-02Samsung Electronics Co., Ltd.Image processing apparatus and method
US20130086382A1 (en)2011-10-042013-04-04Timothy W. BarnettSystems and methods for securely transferring personal identifiers
US20130091583A1 (en)2010-06-152013-04-11Thomson LicensingMethod and device for secured entry of personal data
US20130106690A1 (en)2011-11-012013-05-02Pepsico, Inc.Dispensing System and User Interface
US20130117573A1 (en)2011-11-032013-05-09Proxama LimitedMethod for verifying a password
US8453207B1 (en)*2012-07-112013-05-28Daon Holdings LimitedMethods and systems for improving the security of secret authentication data during authentication transactions
US8453027B2 (en)2009-09-172013-05-28Microsoft CorporationSimilarity detection for error reports
US20130148044A1 (en)2011-12-132013-06-13Japan Display West, Inc.Liquid crystal display device and electronic apparatus
US20130154937A1 (en)2011-12-202013-06-20Electronics And Telecommunications Research InstituteApparatus and method for providing customized keyboard user interface
US20130154981A1 (en)2011-12-202013-06-20Samsung Electronics Co., Ltd.Method and apparatus for providing a shortcut number in a user device
US20130159196A1 (en)2011-12-202013-06-20Ebay, Inc.Secure PIN Verification for Mobile Payment Systems
US20130198459A1 (en)2012-01-272013-08-01Fusion-Io, Inc.Systems and methods for a de-duplication cache
US20130207902A1 (en)2012-02-102013-08-15Hand Held Products, Inc.Apparatus having random ordered keypad
US20130232549A1 (en)2010-11-022013-09-05Michael Ian HawkesMethod and apparatus for securing network communications
WO2013148044A1 (en)2012-03-262013-10-03Symbol Technologies, Inc.Mobile computer with integrated near field communication antenna
US20130265136A1 (en)2012-04-052013-10-10Bank Of AmericaDynamic keypad and fingerprinting sequence authentication
US20130298246A1 (en)2012-05-072013-11-07International Business Machines CorporationObfuscating entry of sensitive information
US20130301830A1 (en)2012-05-082013-11-14Hagai Bar-ElDevice, system, and method of secure entry and handling of passwords
US8621242B2 (en)2004-06-112013-12-31Arm LimitedDisplay of a verification image to confirm security
US20140002558A1 (en)2012-06-292014-01-02Xerox CorporationMethod and apparatus for determining a degree of cure in an ultraviolet printing system
US20140013252A1 (en)2012-07-062014-01-09Sap AgOrganizer for Managing Employee Time and Attendance
WO2014013252A2 (en)2012-07-202014-01-23Licentia Group LimitedAuthentication method and system
US20140025580A1 (en)2008-02-202014-01-23Steven V. BacastowMethod and System for Securing Payment Transactions
US20140096201A1 (en)2011-12-152014-04-03Arupratan GuptaSystems and methods for secured entry of user authentication data
US20140162598A1 (en)2010-11-172014-06-12Antony-Euclid C. Villa-RealCustomer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20140168083A1 (en)2012-07-182014-06-19Sap AgVirtual touchscreen keyboards
US20140173492A1 (en)2012-12-142014-06-19Samsung Electronics Co., Ltd.Method and apparatus for virtual keypad control
US8762876B2 (en)2012-06-212014-06-24Google Inc.Secure data entry via a virtual keyboard
US20140195429A1 (en)2013-01-082014-07-10Cirque CorporationMethod for protecting cardholder data in a mobile device that performs secure payment transactions and which enables the mobile device to function as a secure payment terminal
US20140201831A1 (en)2011-11-102014-07-17Soongsil University Research Consortium Techno-ParkMethod and apparatus for authenticating password of user terminal
WO2014111689A1 (en)2013-01-182014-07-24Licentia Group LimitedAuthentication device & related methods
WO2014132193A2 (en)2013-02-262014-09-04Visa International Service AssociationSystems, methods and devices for performing passcode authentication
EP2775421A1 (en)2013-03-052014-09-10Wincor Nixdorf International GmbHTrusted terminal platform
US20140283022A1 (en)2012-07-112014-09-18Jason Chris BELONCIKMethods and sysems for improving the security of secret authentication data during authentication transactions
US20140310531A1 (en)2013-04-152014-10-16International Business Machines CorporationMethod and system for securing the entry of data to a device
US20140324708A1 (en)2012-06-122014-10-30Square, Inc.Raw sensor input encryption for passcode entry security
US20140324698A1 (en)2012-02-292014-10-30Mobeewave, Inc.Method, device, add-on and secure element for conducting a secured financial transaction on a device
US8965066B1 (en)2013-09-162015-02-24Eye Verify LLCBiometric template security and key generation
US20150095241A1 (en)2013-09-302015-04-02Square, Inc.Scrambling passcode entry interface
WO2015055973A1 (en)2013-10-162015-04-23Mads LandrokTrusted user interface and touchscreen
US20150116225A1 (en)2012-07-052015-04-30Tencent Technology (Shenzhen) Company LimitedCharacter Input Method And Apparatus
WO2015063474A1 (en)2013-10-292015-05-07Cryptomathic LtdSecure mobile user interface and mobile device case
KR101520803B1 (en)2014-12-012015-05-15금오공과대학교 산학협력단Apparatus and method for inputting personal identification number with enhanced security
US20150154598A1 (en)2013-12-022015-06-04At&T Intellectual Property I, L.P.Secure Interaction with Input Devices
US9082253B1 (en)2005-12-202015-07-14Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
US20150261968A1 (en)2014-03-122015-09-17Ebay Inc.Visualizing random characters for keyboard-less devices
US20150332038A1 (en)2014-05-172015-11-19Adriana LyonsSecure entry of secrets
US20150350163A1 (en)2014-06-022015-12-03Blackberry LimitedSystem and method for initiating protected instant messaging conversations
US20150347774A1 (en)2014-05-302015-12-03Apple Inc.Restricted resource classes of an operating system
US20150379288A1 (en)2014-06-252015-12-31International Business Machines CorporationSecure access to running client application features from a browser application
US9235967B1 (en)2005-12-202016-01-12Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
US20160034718A1 (en)2013-10-022016-02-04Criptext, Inc.Method and apparatus for communicating private messages with partially obscured content to limit or prevent unauthorized use of data to impede privacy violations
US20160042190A1 (en)2014-08-112016-02-11International Business Machines CorporationProviding access control of applications on computing device by establishing screen passcodes that allow access to designated screens with designated applications
US20160065546A1 (en)2014-08-272016-03-03Microsoft Technology Licensing, LlcSharing content with permission control using near field communication
US20160063230A1 (en)2014-08-292016-03-03Dropbox, Inc.Fingerprint gestures
WO2016048236A1 (en)2014-09-232016-03-31Singapore Management UniversityLeakage resilient password system and method
WO2016046458A1 (en)2014-09-222016-03-31Prove & RunSmartphone or tablet having a secure display
US20160125193A1 (en)2014-10-292016-05-05Square, Inc.Secure Display Element
US20160154980A1 (en)2013-07-122016-06-02ADUCID s.r.oMethod of secret information entering into electronic digital devices
US20160246955A1 (en)2015-02-242016-08-25Image Match Design Inc.Fingerprint encoding method and system, and fingerprint authenticating method and system
US20160253508A1 (en)2015-02-262016-09-01Kairos Social Solutions, Inc.Device, System, and Method of Preventing Unauthorized Recording of Visual Content Displayed on an Electronic Device
CN105956857A (en)2016-05-062016-09-21上海动联信息技术股份有限公司System and method for generating security virtual password keyboard
US20160283013A1 (en)2015-03-252016-09-29Sony Mobile Communications Inc.Device display control for protecting sensitive data
CN106022172A (en)2016-05-242016-10-12中国银行股份有限公司Password input method and system protecting password keyboard button input operation
US20160314468A1 (en)2013-12-262016-10-27Ned M. SmithSecure transactions using a personal device
US20160320965A1 (en)2005-04-222016-11-03Neopad Inc.Creation method for characters/words and the information and communication service method thereby
US20160337857A1 (en)2014-01-102016-11-17Telsy Elettronica E Telecomunicazioni SpaSecure voice and data method and system
WO2016189325A1 (en)2015-05-272016-12-01Licentia Group LimitedAuthentication methods and systems
US20170006140A1 (en)2015-07-012017-01-05Lg Electronics Inc.Method of transmitting and receiving data using new layer in wireless communication system
US9576411B2 (en)2013-10-182017-02-21Electronics And Telecommunications Research InstituteApparatus and method for providing security keypad through shift of keypad
US20170061408A1 (en)2015-08-312017-03-02Seungshin CHOISecurity key input system and method using one-time keypad
US20170061138A1 (en)1998-07-162017-03-02NoisyCloud, Inc.System and method for secure data transmission and storage
WO2017065576A1 (en)2015-10-142017-04-20주식회사 하렉스인포텍User authentication method and system, which use variable keypad
EP3163926A1 (en)2014-06-262017-05-03Harexinfotech Inc.User authentication method and system using variable keypad and biometric identification
US20170140354A1 (en)2005-12-202017-05-18Diebold Nixdorf, IncorporatedTactile touch screen
EP3176722A1 (en)2015-05-282017-06-07Smart Electronic Industrial (Dong Guan) Co., Ltd.Password setting method and equipment therefor
US20170192670A1 (en)2008-09-192017-07-06Google Inc.Quick Gesture Input
US20170235926A1 (en)2012-01-262017-08-17Blackberry LimitedMethods and devices for distributing content to an electronic device
US20170270764A1 (en)2014-05-092017-09-21Smiths Heimann GmbhThe method and device for monitoring the attentiveness of an operating person
WO2017190561A1 (en)2016-05-062017-11-09平安科技(深圳)有限公司Method for realizing password inputting by means of virtual keyboard, terminal, server, system and storage medium
US20180032831A1 (en)2009-07-312018-02-01Samsung Electronics Co., Ltd.Character recognition and character input apparatus using touch screen and method thereof
KR20180056116A (en)2016-11-182018-05-28조선대학교산학협력단Method and apparatus for authentication using circulation secure keypad and overlapping image
EP3355512A1 (en)2015-09-232018-08-01Harex Infotech Inc.Method and system for authenticating identity using variable keypad
US10108796B2 (en)2012-12-122018-10-23BBPOS LimitedSystem and method for PIN entry on mobile devices
US20180374392A1 (en)2015-12-282018-12-27Mobeewave, Inc.System for and method of authenticating a user on a device

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
NL9100234A (en)1991-02-111992-09-01Philips Nv CODING CIRCUIT FOR TRANSFORMING CODING OF AN IMAGE SIGNAL AND DECODING CIRCUIT FOR DECODING THEREOF.
US5638501A (en)*1993-05-101997-06-10Apple Computer, Inc.Method and apparatus for displaying an overlay image
US5475756A (en)*1994-02-171995-12-12At&T Corp.Method of authenticating a terminal in a transaction execution system
US5802199A (en)*1994-11-281998-09-01Smarttouch, LlcUse sensitive identification system
AU727387B2 (en)*1996-08-282000-12-14Via, Inc.Touch screen systems and methods
JP2001117873A (en)*1999-10-192001-04-27Hitachi Ltd Terminal identification method
BR0109210A (en)2000-03-132002-12-17Pittway Corp Integrated security and communication system with secure communication connection
US7086085B1 (en)*2000-04-112006-08-01Bruce E BrownVariable trust levels for authentication
JP2004514161A (en)*2000-11-112004-05-13スリーウィンドットコム カンパニー リミティッド Secret information input method and device
US20150135206A1 (en)*2002-05-102015-05-14Convergent Media Solutions LlcMethod and apparatus for browsing using alternative linkbases
BRPI0401255A (en)*2004-03-162005-11-01Chang Das Estrelas Wilches Dynamic coding interface authentication system and method
US7515135B2 (en)*2004-06-152009-04-07Research In Motion LimitedVirtual keypad for touchscreen display
KR100594443B1 (en)2004-06-172006-06-30엘지전자 주식회사 How to enter a secure password
US7596701B2 (en)*2004-07-072009-09-29Oracle International CorporationOnline data encryption and decryption
US20070007393A1 (en)*2004-08-042007-01-11Interstellar Technologies CorporationMethod for propulsion
AU2007268223B2 (en)*2006-05-242010-10-07Vidoop, L.L.C.Graphical image authentication and security system
US8834408B2 (en)*2006-11-062014-09-16Aardvark Medical, Inc.Irrigation and aspiration devices and methods
ITRM20070260A1 (en)*2007-05-092008-11-10Menstecnica S R L PORTABLE AND INDEPENDENT SYSTEM FOR THE MEMORY STORAGE AND DISPLACEMENT OF PASSWORD AND PIN
US8532498B2 (en)*2008-02-082013-09-10CelightSecure orthogonal frequency multiplexed optical communications
KR101412586B1 (en)*2008-07-012014-07-02엘지전자 주식회사Method for input of mobile terminal
US20110029971A1 (en)*2009-07-302011-02-03Fujitsu LimitedInformation processing apparatus, image processing method and computer program
CN102262760A (en)*2010-05-282011-11-30杨筑平 Transaction security method, acceptance device and submission software
CN102486678B (en)*2010-12-012015-01-28福建星网视易信息系统有限公司Electronic device and keyboard device thereof and keyboard input method
US9195321B2 (en)*2011-03-172015-11-24Intellitact LlcInput device user interface enhancements
US20140341109A1 (en)*2011-06-022014-11-20Interdigital Patent Holdings, Inc.Methods, Apparatus and Systems for Managing Converged Gateway Communications
EP2716115A1 (en)*2011-06-022014-04-09Interdigital Patent Holdings, Inc.Methods, apparatus and systems for inter-converged gateway (icgw) communications
JP5568077B2 (en)*2011-12-282014-08-06楽天株式会社 Information processing apparatus, information processing method, information processing program, and recording medium on which information processing program is recorded

Patent Citations (441)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB271884A (en)1926-05-251928-06-28Ig Farbenindustrie AgManufacture of ª‡-anthraquinonyl ketones
US2819067A (en)1955-12-221958-01-07Burroughs CorpCheck shingling machine
US3201732A (en)1959-09-251965-08-17Westinghouse Electric CorpWound magnetic core having turns which are given a predetermined set in radius before winding
US3176324A (en)1963-01-111965-04-06American Metal ProdSpring construction
US3270720A (en)1963-03-091966-09-06Daimler Benz AgRotary piston internal combustion engine
US3413071A (en)1963-07-181968-11-26Davis ChesterHexamethyltriaminophenylfluorene printing composition and manifolding sheet therewith
US3375428A (en)1964-02-041968-03-26Lorain Prod CorpRegulated rectifier circuit
US3255323A (en)1964-05-211966-06-07Edward C AustinAutomotive maintenance signalling device
US3392846A (en)1964-10-011968-07-16American Air Filter CoUnit filter assembly
US3347103A (en)1964-11-271967-10-17Bendix CorpVelocity sensor
US3364601A (en)1966-01-191968-01-23Albert H. KorenekApparatus for excavating plants for transplanting
US3621242A (en)1969-12-311971-11-16Bendix CorpDynamic field time-of-flight mass spectrometer
US3762876A (en)1971-10-071973-10-02Honeywell IncDriven vane anemometers
US3965066A (en)1974-03-151976-06-22General Electric CompanyCombustor-turbine nozzle interconnection
FR2622322A1 (en)1987-10-211989-04-28Weck Arnaud DeEncrypted keyboard system
US5193152A (en)1989-11-031993-03-09Racal-Datacom, Inc.Network management system with group naming
EP0432409A1 (en)1989-12-051991-06-19Theodor Kromer GmbH & Co.KG Spezialfabrik für SicherheitsschlösserData input keyboard for coded locks or the like
US5219794A (en)1991-03-141993-06-15Hitachi, Ltd.Semiconductor integrated circuit device and method of fabricating same
US5257486A (en)1991-04-231993-11-02Adhesives Technology Corporation 1987Nozzle for injecting a sealant into a crack
DE4129202A1 (en)1991-09-031993-03-04Hauni Elektronik GmbhProtection circuit for personal identification number key=pad - uses number of keys to enter PIN value, with indicated values varying in pseudo-random manner
WO1993011551A1 (en)1991-12-061993-06-10Maurras Jean FrancoisRendum reset keypad
US5209102A (en)1992-01-311993-05-11American Air LiquideMethod of introducing and controlling compressed gases for impurity analysis
US5434702A (en)1992-03-041995-07-18Northern Telecom LimitedOptical repeaters
US5234389A (en)1992-03-231993-08-10Ford Motor CompanyReleasable overrunning coupling power transmission mechanism acting in cooperation with a friction brake
US5949348A (en)1992-08-171999-09-07Ncr CorporationMethod and apparatus for variable keyboard display
US5363449A (en)1993-03-111994-11-08Tandem Computers IncorporatedPersonal identification encryptor and method
US5549194A (en)1993-12-161996-08-27Joh. Winklhofer & SohneAccumulating conveyor chain
EP0662665A2 (en)1994-01-051995-07-12Transaction Technology, Inc.Wireless banking terminal using cellular telephone communication
US5715078A (en)1994-03-241998-02-03Kabushiki Kaisha ToshibaOptical exposure unit and image forming unit used in optical exposure unit
US5504808A (en)1994-06-011996-04-02Hamrick, Jr.; James N.Secured disposable debit card calling system and method
US5754652A (en)1994-12-141998-05-19Lucent Technologies Inc.Method and apparatus for secure pin entry
WO1997005578A1 (en)1995-07-281997-02-13Mytec Technologies Inc.Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
EP0870222A2 (en)1995-08-211998-10-14Cornel SirbuConditional access method and device
US20020023215A1 (en)1996-12-042002-02-21Wang Ynjiun P.Electronic transaction systems and methods therefor
US6219794B1 (en)1997-04-212001-04-17Mytec Technologies, Inc.Method for secure key management using a biometric
US6193152B1 (en)1997-05-092001-02-27Receiptcity.Com, Inc.Modular signature and data-capture system and point of transaction payment and reward system
US5990586A (en)1997-06-231999-11-23Seitz CorporationMulti-actuator having position controller
US7047222B1 (en)1997-08-062006-05-16International Business Machines CorporationSecure encryption of data packets for transmission over unsecured networks
DE19803339A1 (en)1998-01-291999-08-05Deutsche Telekom AgAccess authorization verification method for banking machine or computer system
US6234389B1 (en)1998-04-292001-05-22@Pos.Com, Inc.PCMCIA-based point of sale transaction system
US20170061138A1 (en)1998-07-162017-03-02NoisyCloud, Inc.System and method for secure data transmission and storage
JP2000099801A (en)1998-09-242000-04-07Oki Electric Ind Co Ltd PIN input device
WO2000025474A1 (en)1998-10-262000-05-04Bradley Madison Company Doing Business As Evolv Adaptive TechnologyCryptographic protocol for financial transactions
US6257486B1 (en)1998-11-232001-07-10Cardis Research & Development Ltd.Smart card pin system, card, and reader
JP2000165378A (en)1998-11-262000-06-16Kodo Ido Tsushin Security Gijutsu Kenkyusho:KkFingerprint authentication device
US6434702B1 (en)1998-12-082002-08-13International Business Machines CorporationAutomatic rotation of digit location in devices used in passwords
US6209102B1 (en)1999-02-122001-03-27Arcot Systems, Inc.Method and apparatus for secure entry of access codes in a computer environment
US6630928B1 (en)1999-10-012003-10-07Hewlett-Packard Development Company, L.P.Method and apparatus for touch screen data entry
US6549194B1 (en)1999-10-012003-04-15Hewlett-Packard Development Company, L.P.Method for secure pin entry on touch screen display
EP1161060A1 (en)1999-12-102001-12-05NTT DoCoMo, Inc.Mobile communication terminal and card information reader
US6671405B1 (en)1999-12-142003-12-30Eastman Kodak CompanyMethod for automatic assessment of emphasis and appeal in consumer images
WO2001046922A2 (en)1999-12-202001-06-28Online Resources Corp.Method and apparatus for securely conducting financial transactions over an insecure network
US6715078B1 (en)2000-03-282004-03-30Ncr CorporationMethods and apparatus for secure personal identification number and data encryption
FR2810067A3 (en)2000-04-102001-12-14Lundar Electric Ind Co LtdHinge for oven door has cut outs in door flanges fitting onto stubs on oven casing and retained by pins
US20040182921A1 (en)2000-05-092004-09-23Dickson Timothy E.Card reader module with account encryption
US20020016918A1 (en)2000-05-122002-02-07David TuckerInformation security method and system
US7305565B1 (en)2000-05-312007-12-04Symbol Technologies, Inc.Secure, encrypting pin pad
US6990586B1 (en)2000-06-022006-01-24International Business Machines Corp.Secure data transmission from unsecured input environments
US20030120612A1 (en)2000-06-132003-06-26Kabushiki Kaisha EightingMethod of electronic settlement with a mobile terminal
FR2812423A1 (en)2000-07-262002-02-01Yohan AmsellemCard payment for an Internet transaction, uses code table prepared when card is manufactured with server interrogation of user who must return correct entries from the code table
US20020082962A1 (en)2000-07-272002-06-27Farris Robert G.Value transfer system for unbanked customers
US20050075973A1 (en)2000-08-222005-04-07Siamack YousofiValidation of transactions
US20020046185A1 (en)2000-08-302002-04-18Jean-Marc VillartSystem and method conducting POS transactions
US20020029342A1 (en)2000-09-072002-03-07Keech Winston DonaldSystems and methods for identity verification for secure transactions
US20040010690A1 (en)2000-11-112004-01-15Eon-Cheol ShinMethod and system for inputting secret information
US20030212327A1 (en)2000-11-242003-11-13U-Systems Inc.Adjunctive ultrasound processing and display for breast cancer screening
FR2819067A1 (en)2000-12-292002-07-05Yakoubi BoualemMethod for controlling access to a secure system, such as an automatic teller machine, using a keyboard for PIN entry, where the values of the keys displayed on a touch screen are changed in a random manner to prevent fraud
DE10100188A1 (en)2001-01-042002-07-18Rohde & SchwarzSystem for encoding PIN code encodes code using biometric signal and stores it; stored encoded PIN code can only be read out of memory and decoded by using same biometric signal
US20020123972A1 (en)2001-02-022002-09-05Hodgson Robert B.Apparatus for and method of secure ATM debit card and credit card payment transactions via the internet
US20020129250A1 (en)2001-02-272002-09-12Akira KimuraAuthentication system and method, identification information inputting method and apparatus ands portable terminal
WO2002071177A2 (en)2001-03-032002-09-12Moneyhive.Com Pte LtdMethod and system for substantially secure electronic transactions
US20050010786A1 (en)2001-03-302005-01-13Michener John R.Trusted authorization device
US7010806B2 (en)2001-05-182006-03-07Sun Microsystems, Inc.Dynamic downloading of keyboard keycode data to a networked client
US20020188872A1 (en)2001-06-062002-12-12Willeby Tandy G.Secure key entry using a graphical user inerface
US20030004877A1 (en)2001-06-272003-01-02Fujitsu LimitedTransaction terminal apparatus
US20030002667A1 (en)2001-06-292003-01-02Dominique GougeonFlexible prompt table arrangement for a PIN entery device
US20030120936A1 (en)2001-08-012003-06-26Eft DatalinkEncryption of financial information
WO2003058947A2 (en)2001-12-262003-07-17Vivotech, Inc.Adaptor for magnetic stripe card reader
US7092915B2 (en)2002-01-072006-08-15International Business Machines CorporationPDA password management tool
US20030132918A1 (en)2002-01-112003-07-17Fitch Timothy R.Ergonomically designed multifunctional transaction terminal
US7992007B2 (en)2002-02-052011-08-02Cardinalcommerce CorporationDynamic pin pad for credit/debit/ other electronic transactions
US20120323788A1 (en)2002-02-052012-12-20Cardinalcommerce CorporationDynamic pin pad for credit/debit/other electronic transactions
US7003316B1 (en)2002-02-222006-02-21Virtual Fonlink, Inc.System and method for wireless transactions
GB2387702A (en)2002-04-172003-10-22Cellectivity LtdMethod of access control using PIN codes
GB2388229A (en)2002-05-042003-11-05Robert MacalonanKeypad for generating code with scrambled displayed key sequence
JP2003346098A (en)2002-05-242003-12-05Fuji Xerox Co LtdPersonal identification system and method and terminal device for personal identification
US20060026440A1 (en)2002-05-312006-02-02Jean-Paul SauveboisMethod for securing an on-line transaction
US20030229597A1 (en)2002-06-052003-12-11Sun Microsystems, Inc., A Delaware CorporationApparatus for private personal identification number management
US20030229598A1 (en)2002-06-052003-12-11Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for protecting against side channel attacks against personal identification numbers
US20030229791A1 (en)2002-06-052003-12-11Sun Microsystems, Inc. A Delaware CorporationMethod for private personal identification number management
GB2389693A (en)2002-06-102003-12-17Consignia PlcPayment systems
US20040039933A1 (en)2002-08-262004-02-26Cricket TechnologiesDocument data profiler apparatus, system, method, and electronically stored computer program product
US20040044739A1 (en)2002-09-042004-03-04Robert ZieglerSystem and methods for processing PIN-authenticated transactions
JP2004102460A (en)2002-09-062004-04-02Hitachi Software Eng Co LtdPersonal authentication method and program therefor
US20060182715A1 (en)2002-09-272006-08-17Alfred SandrockTherapies for chronic inflammatory demyelinating polyneuropathy using interferon-ss
US20060155619A1 (en)2002-09-272006-07-13Rhiando Maxwell EIdentification system
US20040073809A1 (en)2002-10-102004-04-15Wing Keong Bernard Ignatius NgSystem and method for securing a user verification on a network using cursor control
US20040122768A1 (en)2002-12-192004-06-24International Business Machines CorporationElectronic wallet for wireless computing device
US20040122771A1 (en)2002-12-192004-06-24International Business Machines CorporationAutomated teller machine for use with computing devices
US7698563B2 (en)2002-12-232010-04-13Hwa-Shik ShinDevice and method for inputting password using random keypad
US20060053301A1 (en)2002-12-232006-03-09Hwa-Shik ShinDevice and method for inputting password using random keypad
US7735121B2 (en)2003-01-072010-06-08Masih MadaniVirtual pad
DE10306352A1 (en)2003-02-152004-09-02Fuchsenberger, Walter, Dipl.-Ing. (FH)Code number input device for PIN or password in cash machine or access control system, randomly assigns symbols of keypad to individual keys, and resets after input process
EP1599786A2 (en)2003-02-252005-11-30Banco Ita S.A.Virtual keyboard
US20050036611A1 (en)2003-03-312005-02-17Visa U.S.A., Inc.Method and system for secure authentication
US7243237B2 (en)2003-05-022007-07-10Microsoft CorporationSecure communication with a keyboard or related device
GB2402649A (en)2003-06-112004-12-15Mathew Jonathan DawsonPersonal identification code entry device
US20050012715A1 (en)2003-06-122005-01-20Peter Charles Shann Hubird FordMethod, system, and software for interactive communication and analysis
US20050043997A1 (en)2003-08-182005-02-24Sahota Jagdeep SinghMethod and system for generating a dynamic verification value
US7091845B2 (en)2003-09-052006-08-15Hirsch Electronics CorporationData entry systems with biometric devices for security access control
CN100583113C (en)2003-09-192010-01-20谢道裕Magic square digital antifake method and its antifake system
JP2005107678A (en)2003-09-292005-04-21Nec CorpDevice, method and program for password authentication
US20050127158A1 (en)2003-12-152005-06-16Figueras Ilka H.Control card check
US20050127156A1 (en)2003-12-152005-06-16Samsung Electronics Co., Ltd.Portable handset having a radio frequency indentification(RFID) function and method using the same
US20050144449A1 (en)2003-12-302005-06-30Entrust LimitedMethod and apparatus for providing mutual authentication between a sending unit and a recipient
US20050140832A1 (en)2003-12-312005-06-30Ron GoldmanLaser projection display
US20050146447A1 (en)2004-01-052005-07-07Samsung Electronics Co., Ltd.Terminal having keyboard with keys variable in arrangement, and method of rearranging keys of keyboard
US20050177522A1 (en)2004-02-052005-08-11Sun Microsystems, Inc.Method and system for accepting a pass code
US20050193208A1 (en)2004-02-262005-09-01Charrette Edmond E.IiiUser authentication
US20050212763A1 (en)2004-03-262005-09-29Cannon Kabushiki KaishaInformation processing apparatus and method
WO2005104428A2 (en)2004-04-232005-11-03Virtual Fonlink, Inc.Enhanced system and method for wireless transactions
US7395506B2 (en)2004-05-102008-07-01Microsoft CorporationSpy-resistant keyboard
EP1600847A1 (en)2004-05-172005-11-30Ahmed MerroukUniversal device for secure input of confidential data
US8621242B2 (en)2004-06-112013-12-31Arm LimitedDisplay of a verification image to confirm security
US20060003706A1 (en)2004-06-302006-01-05Welland David RRatiometric transmit path architecture for communication systems
JP2008506198A (en)2004-07-072008-02-28バローザ インコーポレイテッド Online data encryption and decryption
US20060104446A1 (en)2004-07-072006-05-18Varghese Thomas EOnline data encryption and decryption
WO2006010058A2 (en)2004-07-072006-01-26Bharosa Inc.Online data encryption and decryption
GB2416058A (en)2004-07-092006-01-11Tricerion LtdSecure data communication between a client terminal and remote server
US20060037067A1 (en)2004-07-092006-02-16Tricerion Ltd.Method of secure data communication
EP1615181A1 (en)2004-07-092006-01-11Tricerion LtdA method of secure data communication
US20060018467A1 (en)2004-07-202006-01-26Scribocel, Inc.Device for authentication and identification for computerized and networked systems
US20060017691A1 (en)2004-07-232006-01-26Juan Manuel Cruz-HernandezSystem and method for controlling audio output associated with haptic effects
US20060032705A1 (en)2004-08-162006-02-16Isham William RLightweight composite ladder rail having supplemental reinforcement in regions subject to greater structural stress
US20060136334A1 (en)2004-11-292006-06-22Atkinson Steven PElectronic system for provision of banking services
US20060133597A1 (en)2004-12-082006-06-22Song Seung MSystem for protecting personal information of a customer when receiving on-line services from a service provider
US20090328197A1 (en)2004-12-162009-12-31Mark Dwight NewellUser validation using images
WO2006064241A2 (en)2004-12-162006-06-22Mark Dwight BedworthUser validation using images
US20060149845A1 (en)2004-12-302006-07-06Xinnia Technology, LlcManaged quality of service for users and applications over shared networks
US20060146169A1 (en)2005-01-032006-07-06Yosef SegmanElectronic viewing device
JP2006243938A (en)2005-03-012006-09-14Oki Electric Ind Co LtdPassword input device
WO2006095203A1 (en)2005-03-072006-09-14Tricerion LtdA method of secure data communication
JP2008537210A (en)2005-03-072008-09-11トリセリオン リミテッド Secured data communication method
US20060206919A1 (en)2005-03-102006-09-14Axalto SaSystem and method of secure login on insecure systems
US20060224523A1 (en)2005-03-312006-10-05Elvitigala Rajith TDynamic keypad
US20060221059A1 (en)2005-04-012006-10-05Samsung Electronics Co., Ltd.Portable terminal having display buttons and method of inputting functions using display buttons
US20160320965A1 (en)2005-04-222016-11-03Neopad Inc.Creation method for characters/words and the information and communication service method thereby
US20060247533A1 (en)2005-04-272006-11-02Sony CorporationPseudorandom number generation apparatus, pseudorandom number generation method and program
GB2427059A (en)2005-06-062006-12-13Bristol Office MachinesPortable transaction processing device
US20070014415A1 (en)2005-06-162007-01-18Harrison Keith AQuantum key distribution method and apparatus
US20070005500A1 (en)2005-06-202007-01-04Microsoft CorporationSecure online transactions using a captcha image as a watermark
EP1742450A2 (en)2005-07-052007-01-10Sony Ericsson Mobile Communications Japan, Inc.Method and mobile terminal device with biometric encrypted personal identification number
US20100098300A1 (en)2005-08-052010-04-22Tilman OttoMethod and system for biometric identification or verification
US20070073937A1 (en)*2005-09-152007-03-29Eugene FeinbergContent-Aware Digital Media Storage Device and Methods of Using the Same
US20070089164A1 (en)2005-10-182007-04-19Gao Jie JSystem and method of alternative key pad layout for enhanced security
US20080172735A1 (en)2005-10-182008-07-17Jie Jenie GaoAlternative Key Pad Layout for Enhanced Security
US20070101150A1 (en)2005-11-022007-05-03Konica Minolta Business Technologies, Inc.Information processing apparatus
US20090067627A1 (en)2005-11-042009-03-12Christian HoglMethod and System for Transmitting Data From a First Data Processing Device to a Second Data Processing Device
WO2007056746A2 (en)2005-11-082007-05-18Ultra-Scan CorporationSystem and method for providing security
US20070110224A1 (en)2005-11-142007-05-17Accenture Global Services GmbhData masking application
US20080319902A1 (en)2005-11-182008-12-25Mark Mervyn ChazanMethod and Apparatus for Facilitating a Secure Transaction
US9235967B1 (en)2005-12-202016-01-12Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
US20170140354A1 (en)2005-12-202017-05-18Diebold Nixdorf, IncorporatedTactile touch screen
US9082253B1 (en)2005-12-202015-07-14Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
US20070209014A1 (en)2006-01-112007-09-06Youssef YoumtoubMethod and apparatus for secure data input
US20070182715A1 (en)2006-02-032007-08-09Research In Motion LimitedConfigurable handheld electronic device
US8270720B1 (en)2006-02-212012-09-18Gruntworx, LlcMethod and system for secure data entry
US20070213090A1 (en)2006-03-072007-09-13Sony Ericsson Mobile Communications AbProgrammable keypad
EP1840778A1 (en)2006-03-292007-10-03Laurent BusserSingle-use identification device
US20100186076A1 (en)2006-03-312010-07-22Axalto SaMethod and system of providing security services using a secure device
US20100223663A1 (en)2006-04-212010-09-02Mitsubishi Electric CorporationAuthenticating server device, terminal device, authenticating system and authenticating method
US8117458B2 (en)2006-05-242012-02-14Vidoop LlcMethods and systems for graphical image authentication
US20090270078A1 (en)2006-05-302009-10-29Gi-Seon NamMethod for configurating keypad of terminal and the terminal and system including the terminal and the keypad capable of reconfiguration
US20070282756A1 (en)2006-06-022007-12-06First Data CorporationPin creation system and method
US20070279391A1 (en)2006-06-062007-12-06Marttila Charles AKeypad with virtual image
WO2007143740A2 (en)2006-06-082007-12-13Mastercard International IncorporatedAll-in-one proximity payment device with local authentication
GB2438886A (en)2006-06-102007-12-12Gina Maria EldonRandom personal identification number input screen
US20080011098A1 (en)2006-06-292008-01-17Krohne AgA heated pipe connecting device for installation of a flow meter
US20080014818A1 (en)2006-07-122008-01-17Marc PriviteraPost conversion nonwovens processing
US20100049768A1 (en)2006-07-202010-02-25Robert James CAutomatic management of digital archives, in particular of audio and/or video files
US20090277968A1 (en)2006-09-072009-11-12Matthew WalkerVisual code transaction verification
US20080110981A1 (en)*2006-11-132008-05-15Gilbarco Inc.Projected user input device for a fuel dispenser and related applications
US20100153270A1 (en)2006-11-272010-06-17Broca Communications LimitedAuthentication of message recipients
US20080148186A1 (en)2006-12-182008-06-19Krishnamurthy Sandeep RamanSecure data entry device and method
CN201035502Y (en)2006-12-282008-03-12上海麦柯信息技术有限公司Safety accidental dynamic soft keyboard
US20080168546A1 (en)2007-01-102008-07-10John AlmeidaRandomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device
US20080165035A1 (en)2007-01-102008-07-10Bhella Kenneth SMethod and System for Customizing Keyboard Map Variants
US8297173B1 (en)2007-01-102012-10-30Wilcox Industries Corp.Modular weapon video display system
US20100121737A1 (en)2007-01-122010-05-13Kenji YoshidaPersonal identification number code input method using dot pattern, personal identification number code input method, and internet shopping settlement system
US20080184036A1 (en)2007-01-312008-07-31Microsoft CorporationPassword authentication via a one-time keyboard map
US20080251969A1 (en)2007-02-162008-10-16Isham William RBladder Molding Systems and Methods For Fabricating Composite Articles
JP2008204409A (en)2007-02-232008-09-04Oki Electric Ind Co LtdPassword input display device and method
US20080209223A1 (en)2007-02-272008-08-28Ebay Inc.Transactional visual challenge image for user verification
US20100182244A1 (en)2007-02-282010-07-22Ntt Docomo, Inc.Information processing device and program
US20080280652A1 (en)2007-05-082008-11-13Firefly Mobile, Inc.Reconfigurable keypad method in handset device operable with plural subsystems
US20080289035A1 (en)2007-05-182008-11-20International Business Machines CorporationMethod and system for preventing password theft through unauthorized keylogging
US20080306995A1 (en)2007-06-052008-12-11Newell Catherine DAutomatic story creation using semantic classifiers for images and associated meta data
CN201111222Y (en)2007-06-082008-09-03北京工业大学 Smart Security Keyboard
WO2009000223A2 (en)2007-06-272008-12-31Universität TübingenDevice and method for tap-proof and manipulation-proof encoding of online accounts
CN101082948A (en)2007-07-052007-12-05上海麦柯信息技术有限公司Portable anti-peeping safety keyboard and method of use thereof
WO2009009788A1 (en)2007-07-122009-01-15Jobmann Brian CIdentity authentication and secured access systems, components, and methods
JP2010533925A (en)2007-07-162010-10-28クゥアルコム・インコーポレイテッド Method and system for personalizing and branding a mobile device keypad
WO2009012326A1 (en)2007-07-162009-01-22Qualcomm IncorporatedMethods and systems personalizing and branding mobile device keypads
US20090033522A1 (en)2007-07-302009-02-05Palm, Inc.Electronic Device with Reconfigurable Keypad
US20090077383A1 (en)2007-08-062009-03-19De Monseignat BernardSystem and method for authentication, data transfer, and protection against phishing
US20090044282A1 (en)2007-08-092009-02-12Technology Properties LimitedSystem and Method for Generating and Displaying a Keyboard Comprising a Random Layout of Keys
US20090066660A1 (en)2007-09-062009-03-12Ure Michael JInterface with and communication between mobile electronic devices
CN101126967A (en)2007-09-112008-02-20卢心东Password input unit
US20090106827A1 (en)2007-10-222009-04-23International Business Machines CorporationSystem and method for user password protection
FR2923034A1 (en)2007-10-262009-05-01Ingenico SaPayment terminal e.g. computer, for e.g. automatic fuel vending machine, has memory storing program for modifying keyboard configuration data before inputting information and controlling displaying of configuration after modifying data
GB2454459A (en)2007-11-062009-05-13Andrew SmallPersonal identification code entry device
US20090183098A1 (en)2008-01-142009-07-16Dell Products, LpConfigurable Keyboard
JP2009199581A (en)2008-01-212009-09-03Nec CorpPersonal identification number input device, method, and program, and cellular phone
US20090193210A1 (en)2008-01-292009-07-30Hewett Jeffrey RSystem for Automatic Legal Discovery Management and Data Collection
US20140025580A1 (en)2008-02-202014-01-23Steven V. BacastowMethod and System for Securing Payment Transactions
GB2457733A (en)2008-02-252009-08-26Mobank LtdSecuring inputting of sensitive information
US20110191856A1 (en)2008-02-252011-08-04Dominic John KeenReceiving input data
US20090213132A1 (en)2008-02-252009-08-27Kargman James BSecure computer screen entry system and method
US20090235199A1 (en)2008-03-122009-09-17International Business Machines CorporationIntegrated masking for viewing of data
US20100323617A1 (en)2008-03-252010-12-23Logomotion, S.R.O.Method, connection and data carrier to perform repeated operations on the key-board of mobile communication device
US20110018033A1 (en)2008-03-262011-01-27Sumitomo Chemical Company, LimitedSemiconductor wafer, semiconductor device, and method of manufacturing a semiconductor device
JP2009237774A (en)2008-03-262009-10-15Advanced Media IncAuthentication server, service providing server, authentication method, communication terminal, and log-in method
US20090254986A1 (en)2008-04-082009-10-08Peter William HarrisMethod and apparatus for processing and displaying secure and non-secure data
DE102008050609A1 (en)2008-04-092009-10-22Kevin WesselActuating device for keypad of automated teller machine, has encoding device arranged between input keypad and actuating unit for another keypad, where encoding device comprises hydraulic and/or pneumatic unit
WO2009130985A1 (en)2008-04-232009-10-29コニカミノルタホールディングス株式会社Information input system
KR20090130455A (en)2008-06-162009-12-24성균관대학교산학협력단 How to change graphic keypad, key layout of graphic keypad, password authentication using graphic keypad
EP2141647A1 (en)2008-06-302010-01-06Accullink LLCSystems and methods for secure pin-based transactions via a host based pin pad
US20110191591A1 (en)2008-07-082011-08-04Li ChengTransmitting Information Using Virtual Input Layout
US20100036783A1 (en)2008-08-062010-02-11Rodriguez Ralph AMethod of and apparatus for combining artificial intelligence (AI) concepts with event-driven security architectures and ideas
DE102009022845A1 (en)2008-08-152010-09-02Günzel, AndreaMethod for input of personal identification number keyboard for input of personal identification number, involves defining number allocation to individual push buttons or pressure zones with each input of chip or magnetic card in associated
US20170192670A1 (en)2008-09-192017-07-06Google Inc.Quick Gesture Input
US20110180336A1 (en)2008-09-302011-07-28Toyota Jidosha Kabushiki KaishaVehicle motor driving system
US20100109920A1 (en)2008-11-052010-05-06Michael Dennis SpradlingSecurity - input key shuffle
DE102008056605A1 (en)2008-11-102010-05-12Borchert, Bernd, Dr.Method for manipulation-secure transmission of e.g. password, from client to server via computer network, for online-banking, involves reconstructing code word, and declining execution of transaction by server
US20100117792A1 (en)2008-11-132010-05-13Patrick FaithDevice including authentication glyph
US20100125509A1 (en)2008-11-142010-05-20Kranzley Arthur DMethods and systems for secure mobile device initiated payments using generated image data
JP2010126913A (en)2008-11-252010-06-10Alpha CorpElectronic lock device and locker equipment
US20100138666A1 (en)2008-12-012010-06-03Neil Patrick AdamsSimplified multi-factor authentication
US20100149100A1 (en)2008-12-152010-06-17Sony Ericsson Mobile Communications AbElectronic Devices, Systems, Methods and Computer Program Products for Detecting a User Input Device Having an Optical Marker Thereon
US8364601B2 (en)2008-12-312013-01-29Intel CorporationMethods and systems to directly render an image and correlate corresponding user input in a secure memory domain
US20100175016A1 (en)2009-01-062010-07-08Wei Cheng TianSecurity key inputting system for touch screen device
US20100174653A1 (en)2009-01-072010-07-08Tian WeichengSecure method and device of financial transaction
US8255323B1 (en)2009-01-092012-08-28Apple Inc.Motion based payment confirmation
US8347103B2 (en)2009-01-132013-01-01Nic, Inc.System and method for authenticating a user using a graphical password
US20100180336A1 (en)2009-01-132010-07-15Nolan JonesSystem and Method for Authenticating a User Using a Graphical Password
US20100306283A1 (en)2009-01-282010-12-02Digitiliti, Inc.Information object creation for a distributed computing system
EP2400426A1 (en)2009-01-302011-12-28Research In Motion LimitedSystem and method for access control in a portable electronic device
US20110281630A1 (en)2009-01-302011-11-17Omarco Networks Solutions LimitedMultifunction authentication systems
US20100215270A1 (en)2009-02-262010-08-26Pradheesh ManoharSystem and Methods for Automatically Accessing a Web Site on Behalf of a Client
US20100242104A1 (en)2009-03-232010-09-23Wankmueller John RMethods and systems for secure authentication
US20100259561A1 (en)2009-04-102010-10-14Qualcomm IncorporatedVirtual keypad generator with learning capabilities
US20120096277A1 (en)2009-04-202012-04-19Alter Core, S.L.System and method for personal authentication using a mobile device
US20100287382A1 (en)2009-05-072010-11-11John Charles GyorffyTwo-factor graphical password for text password and encryption key generation
US20100287097A1 (en)2009-05-082010-11-11Bank Of America CorporationConducting Commercial Transactions with a Mobile Device
US20120047564A1 (en)2009-05-152012-02-23Setcom (Pty) Ltd.Security system and method
WO2010131218A1 (en)2009-05-152010-11-18Setcom (Pty) LtdSecurity system and method
WO2010134808A1 (en)2009-05-202010-11-25Bell Identification B.V.Method of securing entry of an alphanumeric code on a computer system, interaction and dedicated driver entity therefor.
DE102009023925A1 (en)2009-06-042010-12-09Jan FrickeSensible data i.e. personal identification number, inputting device for e.g. automated teller machine, has display comprising number pad, and vision protection filter permitting vision of user on umber pad only from angle of vision
US8176324B1 (en)2009-07-022012-05-08Exelis Inc.Method and system for a secure virtual keyboard
US8375428B2 (en)2009-07-032013-02-12Korea Internet & Security AgencyPassword input system using alphanumeric matrices and password input method using the same
US20110004769A1 (en)2009-07-032011-01-06Yoo-Jae WonPassword input system using an alphanumeric matrix and password input method using the same
US20110020414A1 (en)2009-07-272011-01-27Audrey KuninMoisturizing retinol composition
US20110144586A1 (en)2009-07-302011-06-16Tandem Diabetes Care, Inc.Infusion pump system with disposable cartridge having pressure venting and pressure feedback
US20180032831A1 (en)2009-07-312018-02-01Samsung Electronics Co., Ltd.Character recognition and character input apparatus using touch screen and method thereof
US20110055084A1 (en)2009-08-312011-03-03Saheednanda SinghTechniques for remote controlled physical transactions with dynamic key generation and authentication
US8413071B2 (en)2009-09-152013-04-02Samsung Electronics Co., Ltd.Image processing apparatus and method
US20120185398A1 (en)2009-09-172012-07-19Meir WeisMobile payment system with two-point authentication
US8453027B2 (en)2009-09-172013-05-28Microsoft CorporationSimilarity detection for error reports
US20110090097A1 (en)2009-10-202011-04-21Beshke Thomas CKeyless entry with visual rolling code display
US20110109567A1 (en)2009-11-092011-05-12Kim Hyun-KookMobile terminal and displaying device thereof
US20110204140A1 (en)2009-11-242011-08-25Hart Annmarie DSystem and method for conducting secure pin debit transactions
US20110199387A1 (en)2009-11-242011-08-18John David NewtonActivating Features on an Imaging Device Based on Manipulations
US20110185313A1 (en)2010-01-262011-07-28Idan HarpazMethod and system for customizing a user-interface of an end-user device
WO2011093998A1 (en)2010-01-272011-08-04Rem Holdings 3, LlcCard reader device and method of use
US20110185319A1 (en)2010-01-282011-07-28Giovanni CarapelliVirtual pin pad for fuel payment systems
US8392846B2 (en)2010-01-282013-03-05Gilbarco, S.R.L.Virtual pin pad for fuel payment systems
EP2365469A1 (en)2010-03-102011-09-14Telecash Spólka z Ograniczona OdpowiedzialnosciaMethod for performing payment transaction using personal mobile device and arrangement for personal mobile device
US20110246369A1 (en)2010-03-302011-10-06De Oliveira Marcelo GomesEvent access with data field encryption for validation and access control
US8201732B1 (en)2010-04-122012-06-19Diebold Self-Service Systems Division Of Diebold, IncorporatedBanking system controlled responsive to data bearing records
US20130047237A1 (en)2010-04-262013-02-21Kyu Choul AhnPassword security input system using shift value of password key and password security input method thereof
US20130042318A1 (en)2010-04-292013-02-14Rakesh ThathaAuthentication System and Method Using Arrays
US20110313871A1 (en)2010-05-182011-12-22Laura GreenwoodApparatus, system, and method for facilitating a payment
DE102010022368A1 (en)2010-06-012011-12-01Frank KnopfTouch-screen control panel for e.g. automated teller machine, has number arrangement that ranges between specific values, where arrangement is not rigid and changes each time before operating system configuration
WO2011155915A1 (en)2010-06-102011-12-15Woronec John SMethod and apparatus for securely activating a credit card for a limited period of time
FR2961330A1 (en)2010-06-142011-12-16Jean Claude PaillesMethod for securing electronic transaction between user of e.g. personal computer and goods or service merchant during purchasing of train tickets, involves assuring coherence between constitutive elements of contract and signed message
US20130091583A1 (en)2010-06-152013-04-11Thomson LicensingMethod and device for secured entry of personal data
US20110310019A1 (en)2010-06-162011-12-22International Business Machines CorporationReconfiguration of virtual keyboard
US20110321138A1 (en)2010-06-282011-12-29International Business Machines CorporationMask Based Challenge Response Test
WO2012004395A1 (en)2010-07-092012-01-12Izettle Hardware AbStand-alone secure pin entry device for enabling emv card transactions with separate card reader
WO2012009334A1 (en)2010-07-132012-01-19Kopin CorporationPersonal secure terminal with virtual keypad
US20120042365A1 (en)2010-08-112012-02-16Emc CorporationDisposable browser for commercial banking
US20120079273A1 (en)2010-09-282012-03-29Mu Hua Investments LimitedBiometric Key
US20120095867A1 (en)2010-10-132012-04-19Mckelvey JimIntegrated read head device
US20120098750A1 (en)2010-10-222012-04-26Southern Methodist UniversityMethod for subject classification using a pattern recognition input device
US20130232549A1 (en)2010-11-022013-09-05Michael Ian HawkesMethod and apparatus for securing network communications
US20140162598A1 (en)2010-11-172014-06-12Antony-Euclid C. Villa-RealCustomer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20120132705A1 (en)2010-11-292012-05-31Wincor Nixdorf International GmbhDevice for reading magnetic stripe and/or chip cards with a touch screen for pin entry
EP2458491A2 (en)2010-11-292012-05-30Wincor Nixdorf International GmbHDevice for reading magnetic strips and/or chip cards with touch-screen for PIN entry
WO2012077098A1 (en)2010-12-062012-06-14Deutsche Telekom AgA method for authentication and verification of user identity
CN202150070U (en)2010-12-142012-02-22深圳市中成汇实业有限公司Personal on-line transaction terminal
US20120159592A1 (en)2010-12-162012-06-21Research In Motion LimitedMulti-layered color-sensitive passwords
EP2466519A1 (en)2010-12-162012-06-20Research In Motion LimitedPassword entry using moving images
US20120159614A1 (en)2010-12-162012-06-21Research In Motion LimitedSimple algebraic and multi-layer passwords
EP2487620A1 (en)2010-12-162012-08-15Research In Motion LimitedMulti-layered color-sensitive passwords
US20120159582A1 (en)2010-12-162012-06-21Research In Motion LimitedObscuring visual login
EP2466517A1 (en)2010-12-162012-06-20Research In Motion LimitedSimple algebraic and multi-layered passwords
EP2466520A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer multi-point or pathway-based passwords
EP2466512A1 (en)2010-12-162012-06-20Research In Motion LimitedPressure sensitive multi-layer passwords
US20120159583A1 (en)2010-12-162012-06-21Research In Motion LimitedVisual or touchscreen password entry
US20120159594A1 (en)2010-12-162012-06-21Research In Motion LimitedAdjusting the position of an endpoint reference for increasing security during device log-on
US20120159613A1 (en)2010-12-162012-06-21Jason Tyler GriffinMulti-layer multi-point or randomized passwords
US20120159609A1 (en)2010-12-162012-06-21Research In Motion LimitedPassword entry using moving images
EP2466516A1 (en)2010-12-162012-06-20Research In Motion LimitedAdjusting the position of an endpoint reference for increasing security during device log-on
EP2466515A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer orientation-changing password
US20120159593A1 (en)2010-12-162012-06-21Research In Motion LimitedMulti-layer orientation-changing password
US20120158672A1 (en)2010-12-162012-06-21Microsoft CorporationExtensible Pipeline for Data Deduplication
EP2466518A1 (en)2010-12-162012-06-20Research In Motion LimitedPassword entry using 3D image with spatial alignment
EP2466514A1 (en)2010-12-162012-06-20Research In Motion LimitedMulti-layer multi-point or randomized passwords
EP2466521A1 (en)2010-12-162012-06-20Research In Motion LimitedObscuring visual login
US20120159616A1 (en)2010-12-162012-06-21Research In Motion LimitedPressure sensitive multi-layer passwords
EP2466513A1 (en)2010-12-162012-06-20Research In Motion LimitedVisual or touchscreen password entry
US20120159160A1 (en)2010-12-212012-06-21Poisner David IHigh security display of private data
FR2969342A1 (en)2010-12-212012-06-22Oberthur TechnologiesMethod for entering confidential code to device e.g. computer, to authenticate user, involves selecting character based on time of detection switching of input button, and forming ring for entering each letter in confidential code
US20120162086A1 (en)2010-12-272012-06-28Samsung Electronics Co., Ltd.Character input method and apparatus of terminal
JP2012138011A (en)2010-12-272012-07-19Ns Solutions CorpInformation processing system, information processing method and program
US20120222100A1 (en)2011-02-242012-08-30International Business Machines CorporationAdvanced captcha using integrated images
US20120222102A1 (en)2011-02-242012-08-30Empire Technology Development LlcAuthentication using mobile devices
JP2012194648A (en)2011-03-152012-10-11Nec Personal Computers LtdAuthentication server, authentication system and authentication method of server
US20120253971A1 (en)2011-03-282012-10-04Ebay Inc.Simplified orders using words or phrases
US20120249295A1 (en)2011-03-302012-10-04Acer IncorporatedUser interface, touch-controlled device and method for authenticating a user of a touch-controlled device
WO2012131420A1 (en)2011-03-312012-10-04Infosys LimitedSystem and method for utilizing a dynamic virtual keyboard
US20120260326A1 (en)2011-04-052012-10-11Sap AgImage maps for credential-based security
US20120256723A1 (en)2011-04-082012-10-11Avaya Inc.Random location authentication
EP2512090A1 (en)2011-04-142012-10-17Telefónica Germany GmbH & Co. OHGMethod for authenticating a subscriber
WO2012146587A1 (en)2011-04-272012-11-01Vance BurkillImprovements in or relating to password generation and recall
US20120311723A1 (en)2011-05-062012-12-06Google Inc.Physical Confirmation For Network-Provided Content
US20120291120A1 (en)2011-05-092012-11-15Research In Motion LimitedTouchscreen password entry
EP2523137A1 (en)2011-05-092012-11-14Research In Motion LimitedTouchscreen password entry
US20130023240A1 (en)2011-05-172013-01-24Avish Jacob WeinerSystem and method for transaction security responsive to a signed authentication
US20120305648A1 (en)2011-06-032012-12-06Liquid Payment Solutions Pte LtdHybrid Mobile Phone/Pin Entry Device, System, Method and Article
US20120313858A1 (en)2011-06-102012-12-13Samsung Electronics Co., Ltd.Method and apparatus for providing character input interface
US20130019320A1 (en)2011-07-132013-01-17Salesforce. Com, Inc.Mechanism for facilitating management of data in an on-demand services environment
US20130018800A1 (en)2011-07-152013-01-17Rangaraju DevarajuSecure Authorization of a Financial Transaction
US20130020389A1 (en)2011-07-182013-01-24Barnett Timothy WSystems and methods for authenticating near field communcation financial transactions
WO2013013192A2 (en)2011-07-202013-01-24Visa International Service AssociationCryptographic expansion device and related protocols
US20130021233A1 (en)2011-07-212013-01-24Frederick UmmingerApparatus, system, and method for providing feedback sensations of temperature and hardness-softness to a controller
US20130026513A1 (en)2011-07-252013-01-31Deeder AurongzebOled assembly and luminaire with removable diffuser
US20130029824A1 (en)2011-07-272013-01-31Flexicell Inc.Tier cap forming apparatus
WO2013021233A1 (en)2011-08-052013-02-14Mt Bilgi Teknolojileri Dis Tic, A.S.Multi-communication featured, touch-operated or keyboard cash register with contact and non-contact credit card reader
US20130050088A1 (en)2011-08-292013-02-28Ncr CorporationUser interface
US20130060739A1 (en)2011-09-012013-03-07Microsoft CorporationOptimization of a Partially Deduplicated File
US20130078951A1 (en)2011-09-232013-03-28Jaeseung MUNMobile terminal and method of providing security thereto
US20130086382A1 (en)2011-10-042013-04-04Timothy W. BarnettSystems and methods for securely transferring personal identifiers
US20130106690A1 (en)2011-11-012013-05-02Pepsico, Inc.Dispensing System and User Interface
US20130117573A1 (en)2011-11-032013-05-09Proxama LimitedMethod for verifying a password
US20140201831A1 (en)2011-11-102014-07-17Soongsil University Research Consortium Techno-ParkMethod and apparatus for authenticating password of user terminal
US20130148044A1 (en)2011-12-132013-06-13Japan Display West, Inc.Liquid crystal display device and electronic apparatus
US20140096201A1 (en)2011-12-152014-04-03Arupratan GuptaSystems and methods for secured entry of user authentication data
US20130154981A1 (en)2011-12-202013-06-20Samsung Electronics Co., Ltd.Method and apparatus for providing a shortcut number in a user device
US20130159196A1 (en)2011-12-202013-06-20Ebay, Inc.Secure PIN Verification for Mobile Payment Systems
US20130154937A1 (en)2011-12-202013-06-20Electronics And Telecommunications Research InstituteApparatus and method for providing customized keyboard user interface
US20170235926A1 (en)2012-01-262017-08-17Blackberry LimitedMethods and devices for distributing content to an electronic device
US20130198459A1 (en)2012-01-272013-08-01Fusion-Io, Inc.Systems and methods for a de-duplication cache
US20130207902A1 (en)2012-02-102013-08-15Hand Held Products, Inc.Apparatus having random ordered keypad
US20140324698A1 (en)2012-02-292014-10-30Mobeewave, Inc.Method, device, add-on and secure element for conducting a secured financial transaction on a device
WO2013148044A1 (en)2012-03-262013-10-03Symbol Technologies, Inc.Mobile computer with integrated near field communication antenna
US20130265136A1 (en)2012-04-052013-10-10Bank Of AmericaDynamic keypad and fingerprinting sequence authentication
US20130298246A1 (en)2012-05-072013-11-07International Business Machines CorporationObfuscating entry of sensitive information
US20130301830A1 (en)2012-05-082013-11-14Hagai Bar-ElDevice, system, and method of secure entry and handling of passwords
US20140324708A1 (en)2012-06-122014-10-30Square, Inc.Raw sensor input encryption for passcode entry security
US8762876B2 (en)2012-06-212014-06-24Google Inc.Secure data entry via a virtual keyboard
US20140002558A1 (en)2012-06-292014-01-02Xerox CorporationMethod and apparatus for determining a degree of cure in an ultraviolet printing system
US20150116225A1 (en)2012-07-052015-04-30Tencent Technology (Shenzhen) Company LimitedCharacter Input Method And Apparatus
US20140013252A1 (en)2012-07-062014-01-09Sap AgOrganizer for Managing Employee Time and Attendance
US20140283022A1 (en)2012-07-112014-09-18Jason Chris BELONCIKMethods and sysems for improving the security of secret authentication data during authentication transactions
US8453207B1 (en)*2012-07-112013-05-28Daon Holdings LimitedMethods and systems for improving the security of secret authentication data during authentication transactions
US20140168083A1 (en)2012-07-182014-06-19Sap AgVirtual touchscreen keyboards
US10366215B2 (en)2012-07-202019-07-30Licentia Group LimitedAuthentication method and system
US20160314293A1 (en)2012-07-202016-10-27Licentia Group LimitedAuthentication Method and System
US20200226235A1 (en)2012-07-202020-07-16Licentia Group LimitedAuthentication method and system
GB2520207A (en)2012-07-202015-05-13Licentia Group LtdAuthentication method and system
US20200210557A1 (en)2012-07-202020-07-02Licentia Group LimitedAuthentication method and system
US20200201960A1 (en)2012-07-202020-06-25Licentia Group LimitedAuthentication method and system
US20150154414A1 (en)2012-07-202015-06-04Licentia Group LimitedAuthentication Method and System
US20160224771A1 (en)2012-07-202016-08-04Licentia Group LimitedAuthentication method and system
US9552465B2 (en)2012-07-202017-01-24Licentia Group LimitedAuthentication method and system
WO2014013252A2 (en)2012-07-202014-01-23Licentia Group LimitedAuthentication method and system
US10108796B2 (en)2012-12-122018-10-23BBPOS LimitedSystem and method for PIN entry on mobile devices
US20140173492A1 (en)2012-12-142014-06-19Samsung Electronics Co., Ltd.Method and apparatus for virtual keypad control
US20140195429A1 (en)2013-01-082014-07-10Cirque CorporationMethod for protecting cardholder data in a mobile device that performs secure payment transactions and which enables the mobile device to function as a secure payment terminal
US20150371213A1 (en)2013-01-182015-12-24Mypinpad LimitedAuthentication Device & Related Methods
US20200005273A1 (en)2013-01-182020-01-02Licentia Group LimitedAuthentication Device & Related Methods
WO2014111689A1 (en)2013-01-182014-07-24Licentia Group LimitedAuthentication device & related methods
US20160006718A1 (en)2013-02-262016-01-07Visa International Service AssociationSystems, methods and devices for performing passcode authentication
WO2014132193A2 (en)2013-02-262014-09-04Visa International Service AssociationSystems, methods and devices for performing passcode authentication
EP2775421A1 (en)2013-03-052014-09-10Wincor Nixdorf International GmbHTrusted terminal platform
US20140310531A1 (en)2013-04-152014-10-16International Business Machines CorporationMethod and system for securing the entry of data to a device
US20160154980A1 (en)2013-07-122016-06-02ADUCID s.r.oMethod of secret information entering into electronic digital devices
US8965066B1 (en)2013-09-162015-02-24Eye Verify LLCBiometric template security and key generation
US20150095241A1 (en)2013-09-302015-04-02Square, Inc.Scrambling passcode entry interface
US20160034718A1 (en)2013-10-022016-02-04Criptext, Inc.Method and apparatus for communicating private messages with partially obscured content to limit or prevent unauthorized use of data to impede privacy violations
WO2015055973A1 (en)2013-10-162015-04-23Mads LandrokTrusted user interface and touchscreen
US9576411B2 (en)2013-10-182017-02-21Electronics And Telecommunications Research InstituteApparatus and method for providing security keypad through shift of keypad
WO2015063474A1 (en)2013-10-292015-05-07Cryptomathic LtdSecure mobile user interface and mobile device case
US20150154598A1 (en)2013-12-022015-06-04At&T Intellectual Property I, L.P.Secure Interaction with Input Devices
US20160314468A1 (en)2013-12-262016-10-27Ned M. SmithSecure transactions using a personal device
US20160337857A1 (en)2014-01-102016-11-17Telsy Elettronica E Telecomunicazioni SpaSecure voice and data method and system
US20150261968A1 (en)2014-03-122015-09-17Ebay Inc.Visualizing random characters for keyboard-less devices
US20170270764A1 (en)2014-05-092017-09-21Smiths Heimann GmbhThe method and device for monitoring the attentiveness of an operating person
US20150332038A1 (en)2014-05-172015-11-19Adriana LyonsSecure entry of secrets
US20150347774A1 (en)2014-05-302015-12-03Apple Inc.Restricted resource classes of an operating system
US20150350163A1 (en)2014-06-022015-12-03Blackberry LimitedSystem and method for initiating protected instant messaging conversations
US20150379288A1 (en)2014-06-252015-12-31International Business Machines CorporationSecure access to running client application features from a browser application
EP3163926A1 (en)2014-06-262017-05-03Harexinfotech Inc.User authentication method and system using variable keypad and biometric identification
US20160042190A1 (en)2014-08-112016-02-11International Business Machines CorporationProviding access control of applications on computing device by establishing screen passcodes that allow access to designated screens with designated applications
US20160065546A1 (en)2014-08-272016-03-03Microsoft Technology Licensing, LlcSharing content with permission control using near field communication
US20160063230A1 (en)2014-08-292016-03-03Dropbox, Inc.Fingerprint gestures
WO2016046458A1 (en)2014-09-222016-03-31Prove & RunSmartphone or tablet having a secure display
WO2016048236A1 (en)2014-09-232016-03-31Singapore Management UniversityLeakage resilient password system and method
US20160125193A1 (en)2014-10-292016-05-05Square, Inc.Secure Display Element
KR101520803B1 (en)2014-12-012015-05-15금오공과대학교 산학협력단Apparatus and method for inputting personal identification number with enhanced security
US20160246955A1 (en)2015-02-242016-08-25Image Match Design Inc.Fingerprint encoding method and system, and fingerprint authenticating method and system
US20160253508A1 (en)2015-02-262016-09-01Kairos Social Solutions, Inc.Device, System, and Method of Preventing Unauthorized Recording of Visual Content Displayed on an Electronic Device
US20160283013A1 (en)2015-03-252016-09-29Sony Mobile Communications Inc.Device display control for protecting sensitive data
GB2542512A (en)2015-05-272017-03-22Licentia Group LtdAuthentication methods and systems
US20180150630A1 (en)2015-05-272018-05-31Licentia Group LimitedAuthentication Methods and Systems
WO2016189325A1 (en)2015-05-272016-12-01Licentia Group LimitedAuthentication methods and systems
US20180150623A1 (en)2015-05-272018-05-31Licentia Group LimitedAuthentication Methods and Systems
GB2556474A (en)2015-05-272018-05-30Licentia Group LtdAuthentication methods and systems
US20180150628A1 (en)2015-05-272018-05-31Licentia Group LimitedAuthentication Methods and Systems
US20180150629A1 (en)2015-05-272018-05-31Licentia Group LimitedEncoding Methods and Systems
EP3176722A1 (en)2015-05-282017-06-07Smart Electronic Industrial (Dong Guan) Co., Ltd.Password setting method and equipment therefor
US20170006140A1 (en)2015-07-012017-01-05Lg Electronics Inc.Method of transmitting and receiving data using new layer in wireless communication system
US20170061408A1 (en)2015-08-312017-03-02Seungshin CHOISecurity key input system and method using one-time keypad
EP3355512A1 (en)2015-09-232018-08-01Harex Infotech Inc.Method and system for authenticating identity using variable keypad
WO2017065576A1 (en)2015-10-142017-04-20주식회사 하렉스인포텍User authentication method and system, which use variable keypad
US20180374392A1 (en)2015-12-282018-12-27Mobeewave, Inc.System for and method of authenticating a user on a device
WO2017190561A1 (en)2016-05-062017-11-09平安科技(深圳)有限公司Method for realizing password inputting by means of virtual keyboard, terminal, server, system and storage medium
CN105956857A (en)2016-05-062016-09-21上海动联信息技术股份有限公司System and method for generating security virtual password keyboard
CN106022172A (en)2016-05-242016-10-12中国银行股份有限公司Password input method and system protecting password keyboard button input operation
KR20180056116A (en)2016-11-182018-05-28조선대학교산학협력단Method and apparatus for authentication using circulation secure keypad and overlapping image

Non-Patent Citations (35)

* Cited by examiner, † Cited by third party
Title
Anonymous, "Fujitsu Develops World's First Authentication Technology to Extract and Match 2,048-bit Feature Codes from Palm Vein Images", Fujitsu Global, Kawasaki, Japan, (Aug. 5, 2013), URL: http://www.fujitsu.com/global/about/resources/news/press-releases/2013/0805-01.h tml, (Aug. 1, 2016), XP055292505, 4 pages.
Australian Office Action dated Jan. 18, 2021 of application No. 2016269268.
Chinese Office Action dated Dec. 3, 2020 of Application No. 201680039203.9.
Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices Authors: Teddy Seyed; Xing-Dong Yang; Anthony Tang; Saul Greenberg; Jiawei Gubin; Zhuxiang Cao.
Decision to Grant for related GB2520207 dated Dec. 8, 2015. 2 pages.
Examination Report of Application No. GB1619853.3 dated Mar. 8, 2017. 3 pages.
Examination Report of Indian Application No. 2301/KOLNP/2015 dated Oct. 18, 2019. 5 pages.
EyeDecrypt—Private Interactions in plain Sight, Forte et al., Proc. 9th Conference on Security and Cryptography for Networks (SCN 2014).
GlobalPlatform Device Technology Trusted User Interface API, Version 1.0, Jun. 2013, Document Reference: GPD_SPE_020.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2011116570&tab=PCTBIBLIO&maxRec=1000 (Year: 2010), 4 pages.
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2016188127&tab=PCTBIBLIO&maxRec=1000 (Year: 2015), 6 pages.
Indian Office Action dated Feb. 1, 2021 of application No. 20173704209.
Indian Office Action dated Jan. 21, 2021 of application No. 201737042169.
International Search Report and Written Opinion of International Application No. PCT/GB2016/051548 dated Aug. 8, 2016, 10 pages.
International Search Report and Written Opinion of International Application No. PCT/GB2016/051549 dated Aug. 10, 2016, 11 pages.
International Search Report and Written Opinion of International Application No. PCT/GB2016/051550 dated Aug. 8, 2016, 10 pages.
International Search Report and Written Opinion of International Application No. PCT/GB2016/051553 dated Aug. 4, 2016, 9 pages.
International Search Report in related PCT Application No. PCT/GB2013/051913 dated Feb. 6, 2014. 6 pages.
Japanese Office Action dated Sep. 8, 2020 of application No. 2017-561754.
PCI Mobile Payment Acceptance Security Guidelines for Developers, Version 1.0, Emerging Technologies, PCI Security Standards Council, Sep. 2012.
PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users, Version 1.0, Emerging Technologies, PCI Security Standards Council, Feb. 2013.
Roos, "Automatically Downloading My ING Direct Transactions-Chris Roos", Jun. 23, 2007, XP055085833. 7 pages.
Scramblepad, Scrambleprox, Scramblesmart, Scramblesmartprox Author: Hirsch Electronics Date: Jul. 27, 2013.
Search and Examination Report of Application No. GB1906165.4 dated Aug. 23, 2019, 5 pages.
Search Report cited in Office Action dated Nov. 26, 2019 of Russian Application No. 2017141194/08, 2 pages.
Search Report dated Jul. 22, 2020 of GB application No. GB1916441.7, 2 pages.
Search Report in related GB Application No. GB1212878.1 dated Dec. 3, 2012. 4 pages.
Search Report issued by United Kingdom Intellectual Property Office dated Oct. 6, 2017 for Application No. GB1321505.8, 3 pages.
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR, S. Abughazalah et al, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 422-431.
Thales e-Security mPOS Secure Mobile Card Acceptance White Paper, Nov. 2013.
The Usability of Picture Passwords, Fraser, Jul. 23, 2014, 11 pages.
Touch Screen Remote Arming Station (RAS) Author: Tecom Date: Mar. 18, 2015.
Translation of Office Action dated Nov. 26, 2019 of Russian Application No. 2017141194/08, 6 pages.
Using Biometrics to Generate Public and Private Keys, Satrugna Pakala, (May 31, 2006) Retrieved from internet; URL: http://www.sci.tamucc.edu/˜cams/GraduateProjects/view. php? view=266, 50 pages.
Written Opinion of the Intl Searching Authority in related PCT Application No. PCT/GB2013/051913, 201 , dated Jan. 20, 2015, 11 pages.

Also Published As

Publication numberPublication date
TW201409269A (en)2014-03-01
US20200210557A1 (en)2020-07-02
JP2015534658A (en)2015-12-03
KR101916173B1 (en)2018-11-07
CN113393612A (en)2021-09-14
US20150154414A1 (en)2015-06-04
CN104584086B (en)2017-11-10
US11048784B2 (en)2021-06-29
GB2517879A (en)2015-03-04
EP3929888A1 (en)2021-12-29
RU2015103804A (en)2016-09-10
AU2016101576B4 (en)2017-05-04
MX372767B (en)2020-06-29
AU2013291755B2 (en)2019-05-02
CN104584086A (en)2015-04-29
US20160224771A1 (en)2016-08-04
JP2016197443A (en)2016-11-24
IL236779A (en)2017-11-30
AU2016101577A4 (en)2016-10-06
JP6364408B2 (en)2018-07-25
EP3489918A1 (en)2019-05-29
IL254163A0 (en)2017-10-31
GB201906165D0 (en)2019-06-19
US20200226235A1 (en)2020-07-16
AU2013291755A8 (en)2015-03-19
BR112015000980A2 (en)2017-06-27
NZ739581A (en)2020-02-28
GB201306053D0 (en)2013-05-22
GB2520207B8 (en)2019-04-10
WO2014013252A3 (en)2014-03-20
KR20150060674A (en)2015-06-03
GB201502190D0 (en)2015-03-25
US20160314293A1 (en)2016-10-27
RU2759365C1 (en)2021-11-12
GB2520207A (en)2015-05-13
AU2016101577B4 (en)2017-05-04
US11194892B2 (en)2021-12-07
MY171482A (en)2019-10-15
US20200201960A1 (en)2020-06-25
WO2014013252A2 (en)2014-01-23
EP2875496B1 (en)2021-12-01
US10565359B2 (en)2020-02-18
ZA201409529B (en)2015-12-23
US10366215B2 (en)2019-07-30
CA2878728A1 (en)2014-01-23
AU2016225848A1 (en)2016-09-22
CN107742362B (en)2021-08-20
IL254163B (en)2020-06-30
GB2517879B (en)2019-08-28
US9552465B2 (en)2017-01-24
US20220156350A1 (en)2022-05-19
GB201212878D0 (en)2012-09-05
NZ744304A (en)2020-02-28
AU2016225848B2 (en)2016-09-29
EP2875496A2 (en)2015-05-27
SG10201701975WA (en)2017-04-27
CN107742362A (en)2018-02-27
MX2015000757A (en)2015-08-06
TWI628555B (en)2018-07-01
GB2571019B (en)2019-12-04
RU2639674C2 (en)2017-12-21
AU2013291755A1 (en)2015-02-26
GB2520207B (en)2016-01-06
BR112015000980B1 (en)2021-11-03
SG11201500411YA (en)2015-04-29
GB2571019A (en)2019-08-14
AU2016101576A4 (en)2016-10-06
MX354996B (en)2018-03-27

Similar Documents

PublicationPublication DateTitle
US11048783B2 (en)Authentication method and system
US20170228525A1 (en)Accessing a secured software application
CA2987184A1 (en)Encoding methods and systems

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:MYPINPAD LIMITED, GREAT BRITAIN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PIKE, JUSTIN;REEL/FRAME:052159/0818

Effective date:20120720

Owner name:LICENTIA GROUP LIMITED, GREAT BRITAIN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PIKE, JUSTIN;REEL/FRAME:052159/0818

Effective date:20120720

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

STPPInformation on status: patent application and granting procedure in general

Free format text:WITHDRAW FROM ISSUE AWAITING ACTION

STPPInformation on status: patent application and granting procedure in general

Free format text:AWAITING TC RESP., ISSUE FEE NOT PAID

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20250629


[8]ページ先頭

©2009-2025 Movatter.jp